After attackers gain access to a system, what method can they use to expand their access to other systems without exploiting vulnerabilities on other systems in the network?

Posted by: Pdfprep Category: 210-250 Tags: , ,

After attackers gain access to a system, what method can they use to expand their access to other systems without exploiting vulnerabilities on other systems in the network?
A . change the network gateway address to the attacker’s command and control server
B . establish a Metasploit session to 127.0.0.1 and pass the user’s account hash to it
C . take advantage of domain trust to make connections to a partner network
D . block employees from visiting social media web sites on the company network

Answer: C

Leave a Reply

Your email address will not be published.