Project Management Answers

When cleaning up a system after a compromise, you should look closely for any ______ that may have been installed by the attacker.

Q: When cleaning up a system after a compromise, you should look closely for any ______ that may have been installed by the attacker.

or

Q: It’s important to thoroughly inspect a system after a breach for any ______ that the attacker may have installed.

  • Injection attacks
  • Backdoors 
  • Poisoned DNS caches
  • Rogue Aps

Explanation: When you are cleaning up a system after it has been compromised, you should pay special attention to any “backdoors” that the attacker may have used to gain access to the system. Backdoors are concealed entry points that provide illegal access to the system. Attackers often make use of backdoors to continue exercising control over the system even after the initial penetration has been made. Once the security of the system has been restored, it is essential to locate and close any backdoors that may have been present.

Leave a Reply

Your email address will not be published. Required fields are marked *