8.3.7 - Maintain Access (Practice Questions)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Metasploit

A hacker finds a system that has a poorly design and unpatched program installed. He wants to create a backdoor for himself. Which of the following tools could he use to establish a backdoor?

Backdoors

Which of the following do hackers install in systems to allow them to have continued admittance, gather sensitive information, or establish access to resources and operations within the system?

Spyware

Which of the following is malware that works by stealth to capture information and then sends it to a hacker to gain remote access?

This can lead to DLL hijacking and malicious file installations on a non-admin targeted user.

Hackers can maintain access to a system in several ways. Which of the following best describes the unsecure file and folder method?

Path interception

Which of the following system exploitation methods happens by adding a malicious file to a file path that is missing quotation marks and has spaces in it?


Conjuntos de estudio relacionados

Economics of Education Midterm 2

View Set

Science 8 - Unit 3 What is Light & the Types of Light

View Set

NUR 166 Chap 18, 19, 20, 27 Exam #3 NCLEX Style Questions

View Set