Certified Ethical Hacker v11 312-50v11 – Question341 Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows systems?A. getsystemB. getuidC. keylogrecorderD. autoroute Show Answer Hide Answer Correct Answer: A Post navigation Certified Ethical Hacker v11 312-50v11 – Question340Certified Ethical Hacker v11 312-50v11 – Question342