FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A HACKER

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What is the objective of the Maintaining Access phase
A
To understand how a target reacts to various intrusion attempts, in two ways-when the application’s code is static and when the application’s code is functioning.
B
This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access.
C
Avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action.
D
Is use persitence for a long duration in the infected system in order to steal sensitive information or to spread inside the network, quickly gaining access to the server.
Explanation: 

Detailed explanation-1: -“Maintaining Access” is a phase of the pentest cycle which has a very concrete purpose – to allow the pentester to linger in the targeted systems until he acquires what information he considers to be valuable and then manages to extract it successfully from the system.

Detailed explanation-2: -Persistence in cybersecurity occurs when a threat actor discreetly maintains long-term access to systems despite disruptions such as restarts or changed credentials. Bad actors can place an implant or a “stub” that both evades automated antivirus solutions and kickstarts more malware.

Detailed explanation-3: -The advanced persistent threat pursues its objectives repeatedly over an extended period; adapts to defenders’ efforts to resist it; and is determined to maintain the level of interaction needed to execute its objectives.

Detailed explanation-4: -Hackers do this by trying to locate every log and file that would maintain some record of their presence or movement. For example, Windows and Linux machines keep logs of all logins and actions taken on the computer.

There is 1 question to complete.