An attacker uses an account that allows read-only access to the firewall for checking logs and configuration
files to gain access to an account that gives full control over firewall configuration. This type of attack is BEST
known as:
An administrator wants to make sure that network machines stay up-to-date with current solutions, which of the
following should be done on a regular basis to help facilitate this need?