When attackers use a compromised host as a platform for launching attacks deeper into a company’s network, it is said that they are:
A. escalating privilege
B. becoming persistent
C. fingerprinting
D. pivoting
When attackers use a compromised host as a platform for launching attacks deeper into a company’s network, it is said that they are:
A. escalating privilege
B. becoming persistent
C. fingerprinting
D. pivoting