Which of the following techniques would BEST support this?

A penetration tester obtained root access on a Windows server and, according to the rules of engagement, is permitted to perform post-exploitation for persistence.

Which of the following techniques would BEST support this?
A . Configuring systemd services to run automatically at startup
B . Creating a backdoor
C . Exploiting an arbitrary code execution exploit
D . Moving laterally to a more authoritative server/service

Answer: B

Latest CAS-004 Dumps Valid Version with 128 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments