1.

___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.

A. Exploiting
B. Cracking
C. Hacking
D. Pivoting
Answer» E.


Discussion

No Comment Found