What method can they use to expand their access to other systems without exploiting vulnerabilities on other systems in the network?

After attackers gain access to a system, what method can they use to expand their access to other systems without exploiting vulnerabilities on other systems in the network?
A. change the network gateway address to the attacker’s command and control server
B. establish a Metasploit session to 127.0.0.1 and pass the user’s account hash to it
C. take advantage of domain trust to make connections to a partner network
D. block employees from visiting social media web sites on the company network

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.