Que: ___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems. a. Exploiting b. Cracking c. Hacking d. Pivoting Answer: Pivoting