A hidden infiltration approach that grants repeated access is correct because it reflects a secret entry method that remains undetected. A command agent for data extraction is for moving information, not maintaining stealth entry. Automated scanning helps locate weaknesses, not guarantee future entry. Minimal-privilege access alone does not imply an unseen method for repeated intrusion.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a hidden infiltration approach?
Open an interactive chat with Bash
How does a hidden infiltration approach differ from a command agent for data exfiltration?
Open an interactive chat with Bash
How can organizations detect and prevent hidden infiltration approaches?