ECCouncil EC-Council Certified Security Analyst (ECSA) V10 412-79v10 Question # 17 Topic 2 Discussion

ECCouncil EC-Council Certified Security Analyst (ECSA) V10 412-79v10 Question # 17 Topic 2 Discussion

412-79v10 Exam Topic 2 Question 17 Discussion:
Question #: 17
Topic #: 2

Attackers create secret accounts and gain illegal access to resources using backdoor while bypassing the authentication procedures. Creating a backdoor is a where an attacker obtains remote access to a computer on a network.

412-79v10 Question 17

Which of the following techniques do attackers use to create backdoors to covertly gather critical information about a target machine?


A.

Internal network mapping to map the internal network of the target machine


B.

Port scanning to determine what ports are open or in use on the target machine


C.

Sniffing to monitor all the incoming and outgoing network traffic


D.

Social engineering and spear phishing attacks to install malicious programs on the target machine


Get Premium 412-79v10 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.