B. Use a compromised or obsolete system to traverse the network......pivoting is usually to traverse the network which is different from privilege escalation.
This question speaks about intent, I think if they didn't mention penetration testers the answer would be D but it is B:
"Pivoting is closely related to the concept of lateral movement in cybersecurity, and the terms are often used interchangeably. However, “pivoting” is most accurately used to refer to the act of moving from host to host, while “lateral movement” also includes the act of privilege escalation (gaining access to other users and accounts) on the same machine."
https://www.eccouncil.org/cybersecurity-exchange/penetration-testing/pivoting-penetration-testing/#:~:text=What%20Is%20Pivoting%20in%20cyber,%2C%E2%80%9D%20or%20%E2%80%9Cfoothold.%E2%80%9D
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Soleandheel
11 months, 1 week agoHughJassole
1 year, 5 months agoaleXplicitly
1 year, 7 months agojackdryan
1 year, 6 months agoArsh_2022
1 year, 8 months ago