Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam ECSAv10 Topic 1 Question 77 Discussion

Actual exam question for Eccouncil's ECSAv10 exam
Question #: 77
Topic #: 1
[All ECSAv10 Questions]

Attackers create secret accounts and gain illegal access to resources using backdoor while bypassing the authentication procedures. Creating a backdoor is a where an attacker obtains remote access to a computer on a network.

Which of the following techniques do attackers use to create backdoors to covertly gather critical information about a target machine?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Felicitas
2 months ago
D) Social engineering and spear phishing attacks to install malicious programs on the target machine. Because who needs a good old-fashioned battering ram when you can just trick someone into letting you in?
upvoted 0 times
...
Verda
2 months ago
Ooh, port scanning! Sounds like a fun game of 'Guess the Open Port' to me.
upvoted 0 times
Britt
1 months ago
Layla: Exactly, they use that information to create backdoors and gain access.
upvoted 0 times
...
Antonio
1 months ago
User 3: It's like playing a guessing game with security vulnerabilities.
upvoted 0 times
...
Layla
1 months ago
Yeah, it helps them identify open ports on the target machine.
upvoted 0 times
...
Yuonne
2 months ago
Port scanning is a common technique used by attackers.
upvoted 0 times
...
...
Merissa
3 months ago
Social engineering? More like social demolition if you ask me. Phishing for secrets is a fishy business.
upvoted 0 times
Kristofer
1 months ago
C: Social engineering and spear phishing attacks to install malicious programs on the target machine
upvoted 0 times
...
Rupert
1 months ago
B: Sniffing to monitor all the incoming and outgoing network traffic
upvoted 0 times
...
Elinore
2 months ago
A: Port scanning to determine what ports are open or in use on the target machine
upvoted 0 times
...
...
Cassi
3 months ago
Sniffing is another technique attackers use to gather critical information.
upvoted 0 times
...
Albert
3 months ago
Sniffing, eh? I think I'd rather be a bee and do some honest pollination instead.
upvoted 0 times
...
Suzan
3 months ago
Haha, I bet the backdoor is hidden in the network mapping! Gotta love those sneaky attackers.
upvoted 0 times
Jimmie
3 months ago
B) Port scanning to determine what ports are open or in use on the target machine
upvoted 0 times
...
Moon
3 months ago
A) Internal network mapping to map the internal network of the target machine
upvoted 0 times
...
...
Dominga
3 months ago
I believe social engineering is also used to install malicious programs.
upvoted 0 times
...
Elsa
3 months ago
I agree with Johnson, port scanning helps them determine open ports.
upvoted 0 times
...
Johnson
3 months ago
I think attackers use port scanning to create backdoors.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77