CompTIA Security+ SY0-601 – Question096

After gaining access to a dual-homed (i.e., wired and wireless) multifunction device by exploiting a vulnerability
in the device's firmware, a penetration tester then gains shell access on another networked asset. This
technique is an example of:


A.
privilege escalation.
B. footprinting.
C. persistence.
D. pivoting.

Correct Answer: D