Multiple Choice
During a penetration test, a tester identifies traditional antivirus running on the exploited server. Which of the following techniques would BEST ensure persistence in a post-exploitation phase?
A) Shell binary placed in C:\windows\temp
B) Modified daemons
C) New user creation
D) Backdoored executables
Correct Answer:

Verified
Correct Answer:
Verified
Q69: A consultant is performing a social engineering
Q70: While trying to maintain persistence on a
Q71: A penetration tester is scanning a network
Q72: A penetration tester has obtained access to
Q73: A penetration tester observes that several high-numbered
Q75: A penetration tester is connected to a
Q76: A client asks a penetration tester to
Q77: A penetration tester used an ASP.NET web
Q78: Consumer-based IoT devices are often less secure
Q79: Which of the following properties of the