What term describes adversaries who create multiple points of entry to maintain access?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

What term describes adversaries who create multiple points of entry to maintain access?

Explanation:
Creating multiple entry points to maintain access shows attacker persistence and redundancy. When adversaries establish several footholds—different backdoors, compromised accounts, or access paths across various network segments—they ensure they can return to the environment even if one entry path is discovered and closed. This approach increases resilience, makes containment harder, and buys time for the attacker to achieve goals. The term that directly describes this behavior is the one that states multiple points of entry. The other options refer to general tailoring to vulnerabilities, evading detection, or warning signs, none of which capture the specific idea of maintaining access through several entry paths. In real-world breaches, you might see backdoors, multiple compromised credentials, or separate web shells acting as parallel routes to re-enter the system.

Creating multiple entry points to maintain access shows attacker persistence and redundancy. When adversaries establish several footholds—different backdoors, compromised accounts, or access paths across various network segments—they ensure they can return to the environment even if one entry path is discovered and closed. This approach increases resilience, makes containment harder, and buys time for the attacker to achieve goals. The term that directly describes this behavior is the one that states multiple points of entry. The other options refer to general tailoring to vulnerabilities, evading detection, or warning signs, none of which capture the specific idea of maintaining access through several entry paths. In real-world breaches, you might see backdoors, multiple compromised credentials, or separate web shells acting as parallel routes to re-enter the system.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy