Que: ___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.

a. Exploiting
b. Cracking
c. Hacking
d. Pivoting
Answer: Pivoting

Leave a Comment