Which action is an attacker taking when they attempt to gain root access on the victims system?
A. Privilege escalation
B. Command injections
C. Root kit
D. Command and control
Which action is an attacker taking when they attempt to gain root access on the victims system?
A. Privilege escalation
B. Command injections
C. Root kit
D. Command and control