Which action is an attacker taking when they attempt to gain root access on the victims system?

Which action is an attacker taking when they attempt to gain root access on the victims system?
A. Privilege escalation
B. Command injections
C. Root kit
D. Command and control

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.