Thursday, 30 March 2017

Logical Operations CFR-210 Question Answer

A malicious attacker has compromised a database by implementing a Python-based script that
will automatically establish an SSH connection daily between the hours of 2:00am and 5:00am.
Which of the following is the MOST common motive for the attack vector that was used?

A. Pivoting
B. Persistence/maintaining access
C. Exfiltration
D. Lateral movement

Answer: D