New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil ECSAv10 Exam - Topic 1 Question 77 Discussion

Actual exam question for Eccouncil's ECSAv10 exam
Question #: 77
Topic #: 1
[All ECSAv10 Questions]

Attackers create secret accounts and gain illegal access to resources using backdoor while bypassing the authentication procedures. Creating a backdoor is a where an attacker obtains remote access to a computer on a network.

Which of the following techniques do attackers use to create backdoors to covertly gather critical information about a target machine?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Cordie
3 months ago
Internal network mapping is often overlooked, but super important.
upvoted 0 times
...
Janey
3 months ago
Wait, social engineering? That seems too obvious!
upvoted 0 times
...
Roslyn
3 months ago
Sniffing can be really effective for gathering data.
upvoted 0 times
...
Sherell
4 months ago
Totally agree, port scanning is a common method.
upvoted 0 times
...
Lashandra
4 months ago
Backdoors are a huge security risk!
upvoted 0 times
...
Sheron
4 months ago
I’m a bit confused about the internal network mapping option. I don’t recall it being a common method for creating backdoors, but it could be related.
upvoted 0 times
...
Susana
4 months ago
I practiced a similar question where social engineering was mentioned. It makes sense that attackers would use that to install backdoors.
upvoted 0 times
...
Nu
4 months ago
I'm not entirely sure, but I feel like sniffing could also be a technique they use to gather information. It seems relevant to monitoring traffic.
upvoted 0 times
...
Breana
5 months ago
I remember studying backdoors and how attackers often use port scanning to find vulnerabilities. I think that might be the right answer.
upvoted 0 times
...
Carrol
5 months ago
I'm feeling pretty confident about this one. The question is straightforward, and the answer options seem to cover the most common techniques used by attackers to create backdoors. I'll carefully consider each option and select the one that best fits the scenario described.
upvoted 0 times
...
Elouise
5 months ago
Okay, I've got this. The question is clearly asking about the methods attackers use to bypass authentication and gain unauthorized access. Based on the information provided, I think the answer is likely B, port scanning, or D, social engineering and phishing.
upvoted 0 times
...
Ria
5 months ago
Hmm, I'm a bit confused by the wording of this question. It seems to be asking about specific techniques used by attackers, but I'm not entirely sure how to approach it. I'll need to think this through carefully.
upvoted 0 times
...
Rodolfo
5 months ago
This is a tricky question, but I think I have a good strategy. I'll start by carefully reading through the options and considering which techniques an attacker might use to create a backdoor and gather information.
upvoted 0 times
...
Krissy
5 months ago
This one seems pretty straightforward. I think it's asking about the authentication process when a user logs in through the Marketing Cloud UI.
upvoted 0 times
...
Alaine
5 months ago
This seems straightforward enough. I'll go with option C, as it looks like the correct command to modify the DNS server settings on the LTM device.
upvoted 0 times
...
Felicitas
1 year ago
D) Social engineering and spear phishing attacks to install malicious programs on the target machine. Because who needs a good old-fashioned battering ram when you can just trick someone into letting you in?
upvoted 0 times
...
Verda
1 year ago
Ooh, port scanning! Sounds like a fun game of 'Guess the Open Port' to me.
upvoted 0 times
Britt
1 year ago
Layla: Exactly, they use that information to create backdoors and gain access.
upvoted 0 times
...
Antonio
1 year ago
User 3: It's like playing a guessing game with security vulnerabilities.
upvoted 0 times
...
Layla
1 year ago
Yeah, it helps them identify open ports on the target machine.
upvoted 0 times
...
Yuonne
1 year ago
Port scanning is a common technique used by attackers.
upvoted 0 times
...
...
Merissa
1 year ago
Social engineering? More like social demolition if you ask me. Phishing for secrets is a fishy business.
upvoted 0 times
Kristofer
1 year ago
C: Social engineering and spear phishing attacks to install malicious programs on the target machine
upvoted 0 times
...
Rupert
1 year ago
B: Sniffing to monitor all the incoming and outgoing network traffic
upvoted 0 times
...
Elinore
1 year ago
A: Port scanning to determine what ports are open or in use on the target machine
upvoted 0 times
...
...
Cassi
1 year ago
Sniffing is another technique attackers use to gather critical information.
upvoted 0 times
...
Albert
1 year ago
Sniffing, eh? I think I'd rather be a bee and do some honest pollination instead.
upvoted 0 times
...
Suzan
1 year ago
Haha, I bet the backdoor is hidden in the network mapping! Gotta love those sneaky attackers.
upvoted 0 times
Jimmie
1 year ago
B) Port scanning to determine what ports are open or in use on the target machine
upvoted 0 times
...
Moon
1 year ago
A) Internal network mapping to map the internal network of the target machine
upvoted 0 times
...
...
Dominga
1 year ago
I believe social engineering is also used to install malicious programs.
upvoted 0 times
...
Elsa
1 year ago
I agree with Johnson, port scanning helps them determine open ports.
upvoted 0 times
...
Johnson
2 years ago
I think attackers use port scanning to create backdoors.
upvoted 0 times
...

Save Cancel