Logical Operations CyberSec First Responder CFR-210 Question # 5 Topic 1 Discussion

Logical Operations CyberSec First Responder CFR-210 Question # 5 Topic 1 Discussion

CFR-210 Exam Topic 1 Question 5 Discussion:
Question #: 5
Topic #: 1

A malicious attacker has compromised a database by implementing a Python-based script that will automatically establish an SSH connection daily between the hours of 2:00 am and 5:00 am. Which of the following is the MOST common motive for the attack vector that was used?


A.

Pivoting


B.

Persistence/maintaining access


C.

Exfiltration


D.

Lateral movement


Get Premium CFR-210 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.