List of questions
Related questions
Question 158 - CAS-004 discussion
A penetration tester obtained root access on a Windows server and, according to the rules of engagement, is permitted to perform post-exploitation for persistence.
Which of the following techniques would BEST support this?
A.
Configuring systemd services to run automatically at startup
B.
Creating a backdoor
C.
Exploiting an arbitrary code execution exploit
D.
Moving laterally to a more authoritative server/service
Your answer:
0 comments
Sorted by
Leave a comment first