Certified Ethical Hacker (CEH) Practice Question

During a post-exploitation phase on a Windows Server 2019 host, you need a mechanism that will launch your remote-access Trojan automatically during every boot and run silently in the background even when no user is logged on. Which approach best satisfies this persistence requirement?

  • Overwrite utilman.exe with cmd.exe to trigger a shell via the Sticky Keys shortcut

  • Create a new Windows service that points to the Trojan executable and set its start type to Automatic

  • Place the Trojan's path in HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce

  • Add an entry in the hosts file that maps the server's hostname to the attacker's C2 address

Certified Ethical Hacker (CEH)
System Hacking Phases and Attack Techniques
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot