Which evasion method describes the situation that after gaining access to the administrator password on a compromised host, a threat actor is attempting to login to another host using the same credentials?

  • pivoting
  • traffic substitution
  • resource exhaustion
  • protocol-level misinterpretation

Explanation & Hint:

Pivoting is an evasion method that assumes the threat actor has compromised an inside host and the actor wants to expand the access further into the compromised network.

For more Questions and Answers:

CyberOps Associate (200-201) Certification Practice Exam Answers Full 100%