Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 56 Topic 6 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 56 Topic 6 Discussion

312-50v13 Exam Topic 6 Question 56 Discussion:
Question #: 56
Topic #: 6

During an internal red team engagement at a financial services firm, an ethical hacker named Anika tests persistence mechanisms after successfully gaining access to a junior employee’s workstation. As part of her assessment, she deploys a lightweight binary into a low-visibility system folder. To maintain long-term access, she configures it to launch automatically on every system reboot without requiring user interaction.

Which of the following techniques has most likely been used to ensure the persistence of the attacker’s payload?


A.

Installing a keylogger


B.

Creating scheduled tasks


C.

Modifying file attributes


D.

Injecting into the startup folder


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.