What occurs during the persist phase of a worm attack?
- identification of vulnerable targets
- modification of system files and registry settings to ensure that the attack code is running
- transfer of exploit code through an attack vector
- extension of the attack to vulnerable neighboring targets
Exam with this question: CCNA Security Chapter 1 Exam (CCNAS v1.2)
Please login or Register to submit your answer