1.

___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.(a) Exploiting(b) Cracking(c) Hacking(d) PivotingI got this question during an interview.I'd like to ask this question from Bugs and Vulnerabilities topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct answer is (d) PIVOTING

To elaborate: Pivoting is a technique used by penetration testers to compromise any system WITHIN a NETWORK for targeting other systems. They test systems within the same network for VULNERABILITIES using this technique.



Discussion

No Comment Found

Related InterviewSolutions