In an internal security audit, the white hat hacker gains control over a user a
ccount and attempts to acquire access to another accounts confidential files and information. How can he achieve this?
A. Port Scanning
B. Hacking Active Directory
C. Privilege Escalation
D. Shoulder-Surfing