During a penetration test, a tester identifies traditional antivirus running on the exploited server. Which of the following techniques would BEST ensure persistence in a post-exploitation phase?
A) Shell binary placed in C:\windows\temp
B) Modified daemons
C) New user creation
D) Backdoored executables
Correct Answer:
Verified
Q83: A penetration tester discovers an anonymous FTP
Q84: A penetration tester has successfully exploited a
Q85: During the exploitation phase of a penetration
Q86: A penetration tester is testing a web
Q87: A penetration tester has obtained access to
Q89: A penetration tester is connected to a
Q90: A senior employee received a suspicious email
Q91: When negotiating a penetration testing contract with
Q92: An organization has requested that a penetration
Q93: Which of the following actions BEST matches
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents