During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privileg...
CompTIA CAS-004 Exam
Questions Number: 29 out of 96 Questions
30.21%
Question 29
During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels. Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?