Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Logical Operations Exam CFR-210 Topic 4 Question 75 Discussion

Actual exam question for Logical Operations's CFR-210 exam
Question #: 75
Topic #: 4
[All CFR-210 Questions]

A malicious attacker has compromised a database by implementing a Python-based script that will automatically establish an SSH connection daily between the hours of 2:00 am and 5:00 am. Which of the following is the MOST common motive for the attack vector that was used?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Dustin
24 days ago
Lateral movement, huh? I bet this attacker has a GPS-guided stealth mode - no one will ever see them coming.
upvoted 0 times
Ahmed
1 days ago
A: Persistence/maintaining access
upvoted 0 times
...
...
Vallie
26 days ago
Exfiltration, eh? More like data liberation! Gotta love a hacker with a flair for the dramatic.
upvoted 0 times
...
Vi
1 months ago
Persistence, definitely. This attacker is like a bad house guest - they just won't leave!
upvoted 0 times
Johanna
7 days ago
Persistence is key for attackers, they want to keep control of the compromised system.
upvoted 0 times
...
Arlette
15 days ago
I agree, it's all about maintaining access and staying undetected.
upvoted 0 times
...
Giuseppe
18 days ago
Definitely persistence. The attacker wants to maintain access for as long as possible.
upvoted 0 times
...
...
Jeanice
1 months ago
Ah, the classic 2 AM to 5 AM SSH connection. Looks like someone's been watching too many 'Hackers' movies.
upvoted 0 times
Brittney
2 days ago
D: Definitely, they want to keep control of the compromised system.
upvoted 0 times
...
Frederica
13 days ago
C: It's a common tactic to ensure they can come back in easily.
upvoted 0 times
...
Whitley
20 days ago
B: Yeah, attackers often try to maintain access for future attacks.
upvoted 0 times
...
Felicidad
26 days ago
A: B) Persistence/maintaining access
upvoted 0 times
...
...
Timmy
2 months ago
I believe the attacker could also be looking to perform C) Exfiltration of data from the compromised database.
upvoted 0 times
...
Annalee
2 months ago
I agree with Artie, maintaining access seems like the most common motive for this type of attack.
upvoted 0 times
...
Artie
2 months ago
I think the attacker's motive is B) Persistence/maintaining access.
upvoted 0 times
...

Save Cancel