Cybersecurity
Penetration Testing
Mcq
Oct 16, 2025
Which post-exploitation technique maintains persistent access to compromised systems?
Detailed Explanation
Rootkits provide persistent access by hiding malicious processes and maintaining backdoor access to compromised systems.
Discussion (0)
No comments yet. Be the first to share your thoughts!
Share Your Thoughts