Multiple Choice
After establishing a shell on a target system, Joe, a penetration tester is aware that his actions have not been detected. He now wants to maintain persistent access to the machine. Which of the following methods would be MOST easily detected?
A) Run a zero-day exploit.
B) Create a new domain user with a known password.
C) Modify a known boot time service to instantiate a call back.
D) Obtain cleartext credentials of the compromised user.
Correct Answer:

Verified
Correct Answer:
Verified
Q112: A client requests that a penetration tester
Q113: A penetration tester, who is not on
Q114: An email sent from the Chief Executive
Q115: A consultant wants to scan all the
Q116: Given the following: http://example.com/download.php?id-.../.../.../etc/passwd Which of the
Q118: A penetration tester runs the following from
Q119: While monitoring WAF logs, a security analyst
Q120: A penetration tester is performing ARP spoofing
Q121: Which of the following situations would cause
Q122: A penetration tester notices that the X-Frame-Options