🔥 40% Off Crucial Exams Memberships — Deal ends today!

9 minutes, 53 seconds remaining!

Certified Ethical Hacker (CEH) Practice Question

While conducting an internal penetration test you gain SYSTEM access to a Windows 10 endpoint. Blue team procedures include resetting all Run/RunOnce registry entries, purging user Startup folders, and comparing service and scheduled-task configurations to a gold image every night. They do not audit WMI. Which approach offers a durable, stealthy persistence channel after reboot?

  • Register a permanent WMI event consumer that launches your payload when the system boots.

  • Drop a hidden shortcut to your payload in the C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp folder.

  • Modify the ImagePath of the Print Spooler service to execute your backdoor on startup.

  • Add a malicious value under HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce that points to your payload.

Certified Ethical Hacker (CEH)
System Hacking Phases and Attack Techniques
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot