Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Logical Operations Exam CFR-210 Topic 4 Question 75 Discussion

Actual exam question for Logical Operations's CFR-210 exam
Question #: 75
Topic #: 4
[All CFR-210 Questions]

A malicious attacker has compromised a database by implementing a Python-based script that will automatically establish an SSH connection daily between the hours of 2:00 am and 5:00 am. Which of the following is the MOST common motive for the attack vector that was used?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Dustin
1 months ago
Lateral movement, huh? I bet this attacker has a GPS-guided stealth mode - no one will ever see them coming.
upvoted 0 times
Alexia
10 days ago
C: Lateral movement
upvoted 0 times
...
Geoffrey
12 days ago
B: Exfiltration
upvoted 0 times
...
Ahmed
17 days ago
A: Persistence/maintaining access
upvoted 0 times
...
...
Vallie
1 months ago
Exfiltration, eh? More like data liberation! Gotta love a hacker with a flair for the dramatic.
upvoted 0 times
...
Vi
2 months ago
Persistence, definitely. This attacker is like a bad house guest - they just won't leave!
upvoted 0 times
Ardella
12 days ago
Persistence is key for attackers, they want to ensure they can continue to exploit the system.
upvoted 0 times
...
Eladia
14 days ago
I agree, it's all about maintaining access and control over the compromised system.
upvoted 0 times
...
Joanne
16 days ago
Yes, definitely persistence. They want to maintain access for as long as possible.
upvoted 0 times
...
Johanna
23 days ago
Persistence is key for attackers, they want to keep control of the compromised system.
upvoted 0 times
...
Arlette
1 months ago
I agree, it's all about maintaining access and staying undetected.
upvoted 0 times
...
Giuseppe
1 months ago
Definitely persistence. The attacker wants to maintain access for as long as possible.
upvoted 0 times
...
...
Jeanice
2 months ago
Ah, the classic 2 AM to 5 AM SSH connection. Looks like someone's been watching too many 'Hackers' movies.
upvoted 0 times
Brittney
18 days ago
D: Definitely, they want to keep control of the compromised system.
upvoted 0 times
...
Frederica
29 days ago
C: It's a common tactic to ensure they can come back in easily.
upvoted 0 times
...
Whitley
1 months ago
B: Yeah, attackers often try to maintain access for future attacks.
upvoted 0 times
...
Felicidad
1 months ago
A: B) Persistence/maintaining access
upvoted 0 times
...
...
Timmy
2 months ago
I believe the attacker could also be looking to perform C) Exfiltration of data from the compromised database.
upvoted 0 times
...
Annalee
2 months ago
I agree with Artie, maintaining access seems like the most common motive for this type of attack.
upvoted 0 times
...
Artie
3 months ago
I think the attacker's motive is B) Persistence/maintaining access.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77