___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.
(a) Exploiting
(b) Cracking
(c) Hacking
(d) Pivoting
I got this question during an interview.
I'd like to ask this question from Bugs and Vulnerabilities topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,