Cybersecurity Penetration Testing Mcq
Oct 16, 2025

Which post-exploitation technique maintains persistent access to compromised systems?

Choose the correct answer:
A) Rootkit installation
B) Port scanning
C) Vulnerability scanning
D) Social engineering
Detailed Explanation
Rootkits provide persistent access by hiding malicious processes and maintaining backdoor access to compromised systems.
Discussion (0)

No comments yet. Be the first to share your thoughts!

Share Your Thoughts
Feedback