Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CFR-310 topic 1 question 23 discussion

Actual exam question from CertNexus's CFR-310
Question #: 23
Topic #: 1
[All CFR-310 Questions]

While performing routing maintenance on a Windows Server, a technician notices several unapproved Windows Updates and that remote access software has been installed. The technician suspects that a malicious actor has gained access to the system. Which of the following steps in the attack process does this activity indicate?

  • A. Expanding access
  • B. Covering tracks
  • C. Scanning
  • D. Persistence
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Wutan
7 months, 3 weeks ago
Selected Answer: D
D. Persistence The activity described, where an attacker gains access to a system, installs remote access software, and performs unauthorized actions, indicates the attacker's attempt to establish persistence on the compromised system.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...