Answer:
Automated post-exploitation tools are used to automate the process of escalating privileges on a compromised system.
Automated post-exploitation tools are used to automate the process of escalating privileges on a compromised system.
You may be interested in:
Web Security MCQs