Quiz: Post-Exploitation
1. What is the most important action after gaining access to the system?
2. What does privilege escalation allow you to do?
3. What action should you take to maintain long-term access to the system?
4. What is the goal of covering tracks in post-exploitation?
5. What is the most effective way to maintain access for long-term control?
Comments
Post a Comment