Maintaining Access Practice

Explore persistence, lateral movement, and staying in control of compromised assets in a controlled way.

1. Question

Which action BEST represents maintaining access after an initial compromise?

2. Question

In a controlled engagement, why might a tester avoid deploying advanced rootkits for persistence?

3. Question

Which of the following is a SAFE and ETHICAL way to demonstrate maintaining access?

4. Question

Why is it important to coordinate with the client before leaving any persistent access mechanisms in place during testing?

5. Question

Lateral movement between systems after initial compromise is MOST closely associated with:

6. Question

Which of the following BEST illustrates a 'command and control' (C2) channel?

7. Question

In a red team style assessment, why might an operator prefer 'living off the land' techniques?

8. Question

From a defensive perspective, which log data is MOST likely to reveal attempts at maintaining access?

9. Question

During a pentest, when should any persistent access you have established be removed?

10. Question

Which of the following is the BEST reason to demonstrate maintaining access in a report?

Score: 0.0 / 10 (0 of 10 correct)