Which of the following techniques would BEST support this?
A penetration tester obtained root access on a Windows server and, according to the rules of engagement, is permitted to perform post-exploitation for persistence.
Which of the following techniques would BEST support this?
A . Configuring systemd services to run automatically at startup
B . Creating a backdoor
C . Exploiting an arbitrary code execution exploit
D . Moving laterally to a more authoritative server/service
Answer: B
Latest CAS-004 Dumps Valid Version with 128 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments