adplus-dvertising
frame-decoration

Question

What is a potential disadvantage of using fileless malware in penetration testing?

a.

Persistence through system reboots

b.

Resistance to detection by antimalware tools

c.

Need for repeated compromise after system reboot

d.

Creation of local artifacts in the target system

Answer: (c).Need for repeated compromise after system reboot Explanation:A potential disadvantage of using fileless malware in penetration testing is the need for repeated compromise after a system reboot.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What is a potential disadvantage of using fileless malware in penetration testing?

Similar Questions

Discover Related MCQs

Q. How can a penetration tester schedule a task on a Windows system using the command line?

Q. What is one common method of exploiting SSH vulnerabilities?

Q. How can long-term access to systems be achieved by exploiting SSH keys?

Q. What is the primary focus of testing network segmentation in the context of penetration testing?

Q. What is a method used by tools allowing VLAN hopping?

Q. What is the purpose of tools like TruffleHog in the context of penetration testing?

Q. Where are unintentionally exposed secret keys frequently found?

Q. What is the primary purpose of post-exploit attacks in penetration testing?

Q. What is the primary purpose of dictionary attacks in penetration testing?

Q. What is a common technique in password cracking when targeting a specific organization?

Q. What is the purpose of rainbow tables in password cracking?

Q. When might cross-compiling be used in penetration testing?

Q. What is the primary focus of horizontal escalation attacks in privilege escalation?

Q. Which of the following is one of the most commonly used local exploit methods for vertical escalation?

Q. What is a potential advantage of social engineering tests in a penetration test?

Q. In the context of privilege escalation, what do vertical escalation attacks focus on?

Q. What is the purpose of limited shells?

Q. What is the significance of setuid binaries in the context of limited shells and privilege escalation?

Q. What is a potential advantage of using scheduled jobs or tasks for persistence?

Q. How can Inetd modification be used for maintaining a persistent connection?