CompTIA CySA+ CS0-003 Practice Question
An analyst is evaluating a compromised system and observes behavior consistent with an adversary attempting to maintain persistent access to a network resource. According to the MITRE ATT&CK framework, which tactic BEST describes this behavior?
Defense Evasion
Persistence
Exfiltration
Privilege Escalation