Which of the following penetration testing concepts is an attacker MOST interested in when placing the path of a malicious file in the Windows/CurrentVersion/Run registry key?
A) Persistence
B) Pivoting
C) Active reconnaissance
D) Escalation of privilege
Correct Answer:
Verified
Q831: A company wants to provide centralized authentication
Q832: A company needs to implement a system
Q833: Which of the following uses tokens between
Q834: Which of the following are used to
Q835: A security administrator is reviewing the following
Q837: A security analyst is specifying requirements for
Q838: When considering IoT systems, which of the
Q839: A customer calls a technician and needs
Q840: A staff member contacts the help desk
Q841: A company wants to ensure users are
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents