In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire access to another account’s confidential files and information. How can he achieve this?

Last Updated on August 14, 2021 by Admin

In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire access to another account’s confidential files and information. How can he achieve this?

  • Port Scanning
  • Hacking Active Directory
  • Privilege Escalation
  • Shoulder-Surfing
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments