___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.
(a) Exploiting
(b) Cracking
(c) Hacking
(d) Pivoting
I got this question during an interview.
I'd like to ask this question from Bugs and Vulnerabilities topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security