In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire
access to another account’s confidential files and information. How can he achieve this?
A.
Port Scanning
B.
Hacking Active Directory
C.
Privilege Escalation
D.
Shoulder-Surfing
C