List of questions
Related questions
Question 19 - PT0-003 discussion
As part of an engagement, a penetration tester wants to maintain access to a compromised system after rebooting. Which of the following techniques would be best for the tester to use?
A.
Establishing a reverse shell
B.
Executing a process injection attack
C.
Creating a scheduled task
D.
Performing a credential-dumping attack
Your answer:
0 comments
Sorted by
Leave a comment first