Which term describes attacker actions to stay undetected on an IoT device by clearing logs, updating firmware, and using backdoors and Trojans?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which term describes attacker actions to stay undetected on an IoT device by clearing logs, updating firmware, and using backdoors and Trojans?

Explanation:
Maintaining access focuses on keeping a foothold on a compromised device and remaining undetected for future operations. On an IoT device, clearing logs helps hide the intrusion, firmware updates can be used to conceal modifications or reinstall hidden backdoors, and backdoors or Trojans ensure the attacker can reconnect even after the initial access point is discovered. This mix centers on persistence and stealth, not on higher privileges, information gathering, or stealing data. Privilege escalation is about gaining more rights after access is obtained, reconnaissance is about discovering targets, and exfiltration is about moving data out of the system.

Maintaining access focuses on keeping a foothold on a compromised device and remaining undetected for future operations. On an IoT device, clearing logs helps hide the intrusion, firmware updates can be used to conceal modifications or reinstall hidden backdoors, and backdoors or Trojans ensure the attacker can reconnect even after the initial access point is discovered. This mix centers on persistence and stealth, not on higher privileges, information gathering, or stealing data. Privilege escalation is about gaining more rights after access is obtained, reconnaissance is about discovering targets, and exfiltration is about moving data out of the system.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy