Exam CFR-310 All QuestionsBrowse all questions from this exam
Question 23

While performing routing maintenance on a Windows Server, a technician notices several unapproved Windows Updates and that remote access software has been installed. The technician suspects that a malicious actor has gained access to the system. Which of the following steps in the attack process does this activity indicate?

    Correct Answer: D

    The activity described, where an attacker gains access to a system, installs remote access software, and performs unauthorized actions such as unapproved updates, indicates the attacker's attempt to establish persistence on the compromised system. Persistence refers to techniques that adversaries use to keep access to a system despite interruptions such as restarts, credential changes, or other disruptions that could potentially cut off their access.

Discussion
WutanOption: D

D. Persistence The activity described, where an attacker gains access to a system, installs remote access software, and performs unauthorized actions, indicates the attacker's attempt to establish persistence on the compromised system.