|
|
Criado por Carla Torres8499
mais de 9 anos atrás
|
|
| Questão | Responda |
| System Hacking | The attacker attacks the target system using the information acquired in footprinting, scanning and enumeration. |
| Gaining access | To bypass access controls to gain access to the system using information obtained previously |
| Escalating privileges | Using a low-privileged normal user accounts, attacker tries to increase the administrator privileges to performe protected operations |
| Executing applications | Attacker attempts to install malicious programs (Trojans, Backdoors, Keyloggers, etc.) and having remote system access |
| Hiding files | The attacker tries to hide the malicious code that has been installed and thus its activities |
| Covering tracks | To remain undetected, attacker tries to erase all evidence of security compromise from the system |
Quer criar seus próprios Flashcards gratuitos com GoConqr? Saiba mais.