Which of the follow...
 
Notifications
Clear all

Which of the following techniques would BEST support this?

1 Posts
1 Users
0 Likes
159 Views
(@tivisantwan)
Noble Member
Joined: 2 years ago
Posts: 716
Topic starter  

A penetration tester obtained root access on a Windows server and, according to the rules of engagement, is permitted to perform post-exploitation for persistence.

Which of the following techniques would BEST support this?

  • A . Configuring systemd services to run automatically at startup
  • B . Creating a backdoor
  • C . Exploiting an arbitrary code execution exploit
  • D . Moving laterally to a more authoritative server/service

Show Answer Hide Answer

Suggested Answer: B

   
Quote
Topic Tags

Latest CompTIA CAS-004 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: