Bird
0
0

An APT group uses a zero-day exploit to gain access and then installs a backdoor. What would be the expected behavior of the backdoor?

medium📝 Analysis Q5 of 15
Cybersecurity - Advanced Threat Protection
An APT group uses a zero-day exploit to gain access and then installs a backdoor. What would be the expected behavior of the backdoor?
ASend spam emails to all contacts
BImmediately delete all files on the system
CAllow attackers to remotely control the system silently
DDisplay a ransom note demanding payment
Step-by-Step Solution
Solution:
  1. Step 1: Define backdoor purpose in APT

    Backdoors provide stealthy remote access for attackers to control the system.
  2. Step 2: Exclude disruptive or obvious actions

    Deleting files, spamming, or ransom notes are noisy and not typical for stealthy APT backdoors.
  3. Final Answer:

    Allow attackers to remotely control the system silently -> Option C
  4. Quick Check:

    Backdoor = Silent remote control [OK]
Quick Trick: Backdoors give quiet remote access to attackers [OK]
Common Mistakes:
MISTAKES
  • Confusing backdoors with ransomware behavior
  • Expecting immediate destructive actions
  • Thinking backdoors send spam

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More Cybersecurity Quizzes