ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 158 - CAS-004 discussion

Report
Export

A penetration tester obtained root access on a Windows server and, according to the rules of engagement, is permitted to perform post-exploitation for persistence.

Which of the following techniques would BEST support this?

A.
Configuring systemd services to run automatically at startup
Answers
A.
Configuring systemd services to run automatically at startup
B.
Creating a backdoor
Answers
B.
Creating a backdoor
C.
Exploiting an arbitrary code execution exploit
Answers
C.
Exploiting an arbitrary code execution exploit
D.
Moving laterally to a more authoritative server/service
Answers
D.
Moving laterally to a more authoritative server/service
Suggested answer: B
asked 02/10/2024
SAI CHARAN TANGELLA
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first