Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CFR-310 All Questions

View all questions & answers for the CFR-310 exam

Exam CFR-310 topic 1 question 23 discussion

Actual exam question from CertNexus's CFR-310
Question #: 23
Topic #: 1
[All CFR-310 Questions]

While performing routing maintenance on a Windows Server, a technician notices several unapproved Windows Updates and that remote access software has been installed. The technician suspects that a malicious actor has gained access to the system. Which of the following steps in the attack process does this activity indicate?

  • A. Expanding access
  • B. Covering tracks
  • C. Scanning
  • D. Persistence
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
044f354
1 month, 3 weeks ago
Selected Answer: D
D. Persistence Explanation: The installation of remote access software and unapproved updates suggests that the malicious actor is trying to ensure continued access to the system, which is a key indicator of persistence in the attack process. Why the other answers are incorrect: A. Expanding access: Expanding access typically refers to the attacker escalating privileges or moving laterally through the network. While the attacker may have installed remote access software, this is more about maintaining control than expanding access. B. Covering tracks: This refers to actions like deleting logs or obfuscating malicious activity to avoid detection. Installing remote access software doesn't necessarily indicate covering tracks. C. Scanning: Scanning is the phase where an attacker gathers information about the system or network. The observed activity (installing software and updates) is not related to scanning.
upvoted 1 times
...
Wutan
1 year, 2 months ago
Selected Answer: D
D. Persistence The activity described, where an attacker gains access to a system, installs remote access software, and performs unauthorized actions, indicates the attacker's attempt to establish persistence on the compromised system.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...