Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam ITS-110 Topic 1 Question 10 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 10
Topic #: 1
[All ITS-110 Questions]

Which of the following tools or techniques is used by software developers to maintain code, but also used by hackers to maintain control of a compromised system?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Kerrie
18 days ago
Debuggers? Isn't that like using a spoon to eat soup? Seems a bit too obvious for the hackers, don't you think?
upvoted 0 times
...
Leah
20 days ago
Backdoors, of course! That's the oldest trick in the book. Though I bet the dLeahlopers would call them 'maintenance access points' or something.
upvoted 0 times
...
Gayla
22 days ago
Disassembler? That's a classic hacker tool, no doubt. But I've also used it for reverse engineering my own code. The tools don't make the hacker, I suppose.
upvoted 0 times
Yuki
3 days ago
A) Disassembler
upvoted 0 times
...
...
Brandon
1 months ago
Stack pointer? Isn't that just for keeping track of memory addresses? How does that help hackers maintain control? This is a tricky one.
upvoted 0 times
Shaquana
4 days ago
B) Backdoor
upvoted 0 times
...
Ilene
23 days ago
B) Backdoor
upvoted 0 times
...
Malika
23 days ago
A) Disassembler
upvoted 0 times
...
Thersa
29 days ago
A) Disassembler
upvoted 0 times
...
...
Alana
1 months ago
A debugger? Really? I thought that was just for the good guys. Guess the line between white and black hats is blurrier than I thought.
upvoted 0 times
...
Sunshine
1 months ago
But hackers use backdoors to maintain control of compromised systems, so it makes sense that it could be the answer.
upvoted 0 times
...
Joanna
2 months ago
I disagree, I believe the answer is A) Disassembler.
upvoted 0 times
...
Sunshine
2 months ago
I think the answer is B) Backdoor.
upvoted 0 times
...
Carma
2 months ago
Hmm, backdoors are definitely used by both developers and hackers. It's a slippery slope, isn't it?
upvoted 0 times
Kate
3 days ago
D) Stack pointer
upvoted 0 times
...
Valentin
9 days ago
D) Stack pointer
upvoted 0 times
...
Crista
12 days ago
C) Debugger
upvoted 0 times
...
Antonio
14 days ago
C) Debugger
upvoted 0 times
...
Corrie
15 days ago
B) Backdoor
upvoted 0 times
...
Van
19 days ago
B) Backdoor
upvoted 0 times
...
Gregoria
27 days ago
A) Disassembler
upvoted 0 times
...
Aleta
1 months ago
A) Disassembler
upvoted 0 times
...
...

Save Cancel