An attacker uses an account that allows read-only access to the firewall for checking logs and configuration files to gain access to an account that gives full control over firewall configuration. This type of attack is BEST known as:
exploiting a weak password.
exploiting a back door.
a man-in-the-middle attack.
Want to practice for JK0-015 - CompTIA E2C/Security+ Certification Exam ?