8.3 Maintain Access

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following do hackers install in systems to allow them to have continued admittance, gather sensitive information, or establish access to resources and operations within the system? -Crackers -Backdoors -Kerberos -cPassword

Backdoors

A hacker finds a system that has a poorly design and unpatched program installed. He wants to create a backdoor for himself. Which of the following tools could he use to establish a backdoor? -AuditPol -CCleaner -Metasploit -Timestomp

Metasploit

Which of the following system exploitation methods happens by adding a malicious file to a file path that is missing quotation marks and has spaces in it? -Writable services -Spyware -Path interception -Unsecure file and folder permissions

Path interception

Which of the following is malware that works by stealth to capture information and then sends it to a hacker to gain remote access? -Crackers -Spyware -ERD Commander -Writable services

Spyware

Hackers can maintain access to a system in several ways. Which of the following best describes the unsecure file and folder method? -This can lead to DLL hijacking and malicious file installations on a non-admin targeted user. -Services with weak permissions allow anyone to alter the execution of the service. -There is no problem if the path is written within quotation marks and has no spaces. -The hacker will have rights to do whatever the admin account can do.

This can lead to DLL hijacking and malicious file installations on a non-admin targeted user.


Conjuntos de estudio relacionados

business ethics midterm (quiz questions)

View Set

Chapter 47: The Child With Endocrine Dysfunction

View Set

Module 11 Review Quiz, Module 12 Review Quiz, Module 10 Review Quiz

View Set

Varcarolis: Chapter 17 Somatic Symptom Disorders

View Set

Information Systems: A manager's guide to harnessing technology: Chapter 2

View Set

Chapter 53: Assessment of Kidney and Urinary Function

View Set