Cybersecurity Penetration Testing Mcq
Oct 16, 2025

Which technique allows attackers to move laterally through a network after initial compromise?

Choose the correct answer:
A) Privilege escalation
B) Pass-the-hash
C) Buffer overflow
D) SQL injection
Detailed Explanation
Pass-the-hash attacks use captured password hashes to authenticate to other systems without knowing the actual password.
Discussion (0)

No comments yet. Be the first to share your thoughts!

Share Your Thoughts
Feedback