New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil ECSAv10 Exam - Topic 6 Question 19 Discussion

Actual exam question for Eccouncil's ECSAv10 exam
Question #: 19
Topic #: 6
[All ECSAv10 Questions]

Attackers create secret accounts and gain illegal access to resources using backdoor while bypassing the authentication procedures. Creating a backdoor is a where an attacker obtains remote access to a computer on a network.

Which of the following techniques do attackers use to create backdoors to covertly gather critical information about a target machine?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Lindy
4 months ago
Wait, people still fall for spear phishing? That's wild!
upvoted 0 times
...
Josephine
4 months ago
Sniffing is super sneaky, but does it really work all the time?
upvoted 0 times
...
Alberta
4 months ago
I don't think social engineering is as effective as people say.
upvoted 0 times
...
Claribel
4 months ago
Totally agree, port scanning is a classic method!
upvoted 0 times
...
Kaycee
5 months ago
Backdoors are often created through port scanning.
upvoted 0 times
...
Yuki
5 months ago
I’m leaning towards option D because it makes sense that attackers would use social engineering to install backdoors, but I could be wrong.
upvoted 0 times
...
Robt
5 months ago
Sniffing seems like it could be a way to gather information, but I feel like it’s more about monitoring traffic than creating a backdoor.
upvoted 0 times
...
Charlene
5 months ago
I remember practicing a question similar to this where port scanning was highlighted as a method to find vulnerabilities. That might be relevant here too.
upvoted 0 times
...
Roselle
5 months ago
I think backdoors often involve social engineering, but I'm not entirely sure if that's the main technique used here.
upvoted 0 times
...
Tyra
5 months ago
I'm pretty confident the answer is B, Canada. I remember learning that Canada has a different data privacy framework than the EU, so they haven't received that adequacy determination yet. Gotta love these tricky data protection questions!
upvoted 0 times
...
Carylon
5 months ago
This seems like a straightforward Regulation S-P question. I'll focus on the key details - Joan is a customer, Jean is not, and the question is about GetErDone's privacy policy obligations.
upvoted 0 times
...
Leota
5 months ago
I can't decide between A and D. I think they both seem essential, but I might be leaning towards A because user orientation feels more fundamental.
upvoted 0 times
...
Marla
5 months ago
I'm a bit uncertain about the Asynchronous Queuing pattern. Did we learn enough about it to know if it really helps reduce lag in this scenario?
upvoted 0 times
...
Leah
5 months ago
This seems like a straightforward question about IT governance. I'll focus on understanding the key drivers for change and assessing the current state of IT governance within the organization.
upvoted 0 times
...

Save Cancel