1.

In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?(a) Scanning(b) Maintaining access(c) Maintaining Access(d) Gaining accessThe question was posed to me in an online quiz.My enquiry is from Generic Steps for Security in portion Cyber Security of Cyber Security

Answer»

Correct choice is (c) Maintaining Access

For explanation: After gaining access to a system, the hacker needs to keep a path OPEN so that he/she in FUTURE can access the system. Therefore, BACKDOORS are SET which will later allow the attacker to gain access through it EASILY.



Discussion

No Comment Found

Related InterviewSolutions