A consultant successfully gains elevated control of a workstation and wants to keep the remote connection when the system comes back online. Which technique accomplishes that goal?
Remove blocking rules from the local security filters
Set up a job that runs at system boot to launch a network listener
Modify user environment variables to load remote tools
Place injected code in memory for an active session
Scheduling a script that triggers at startup helps the consultant regain access whenever the system restarts. Removing firewall filters does not ensure sessions survive reboots. Changing user environment variables does not guarantee automatic connections. Injecting code into memory is temporary for that session and does not persist through shutdowns.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a network listener in the context of maintaining remote access?
Open an interactive chat with Bash
How does setting up a startup job ensure persistence in a compromised system?
Open an interactive chat with Bash
Why is injecting code into memory not sufficient for persistence?