What term describes software or code that provides an attacker with ongoing, covert access to a system?

Prepare for the EC-Council Certified Ethical Hacker (CEH) Exam. Use flashcards and multiple-choice questions with hints and explanations. Enhance your cyber security knowledge and get ready for the exam!

Multiple Choice

What term describes software or code that provides an attacker with ongoing, covert access to a system?

Explanation:
Backdoors are covert entry points that give an attacker ongoing access to a system, bypassing normal authentication and control mechanisms. They enable persistence—once installed, they stay in place and can be used to reconnect even after the original vulnerability is closed. These mechanisms can be hidden or disguised to avoid detection, letting the attacker maintain control over the compromised host for extended periods. In contrast, rootkits focus on hiding the presence of malicious software, trojans rely on deceiving users to install themselves, and keyloggers simply record keystrokes. While a backdoor can be part of other malware, its defining trait is the ability to keep access open for the attacker.

Backdoors are covert entry points that give an attacker ongoing access to a system, bypassing normal authentication and control mechanisms. They enable persistence—once installed, they stay in place and can be used to reconnect even after the original vulnerability is closed. These mechanisms can be hidden or disguised to avoid detection, letting the attacker maintain control over the compromised host for extended periods. In contrast, rootkits focus on hiding the presence of malicious software, trojans rely on deceiving users to install themselves, and keyloggers simply record keystrokes. While a backdoor can be part of other malware, its defining trait is the ability to keep access open for the attacker.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy