During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privileg...


CompTIA CAS-004 Exam

Questions Number: 29 out of 96 Questions
30.21%

Question 29
During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels.
Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?







Previous Questions Next Questions