Which of the following steps in the attack process does this activity indicate?

While performing routing maintenance on a Windows Server, a technician notices several unapproved Windows Updates and that remote access software has been installed. The technician suspects that a malicious actor has gained access to the system.

Which of the following steps in the attack process does this activity indicate?
A . Expanding access
B . Covering tracks
C . Scanning
D . Persistence

Answer: A

Latest CFR-310 Dumps Valid Version with 100 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments