Well done!

You have completed Quiz 6.3!

Quiz Question 1 of 5

Which malware technique is commonly used during the persistence phase of a cyberattack to ensure that the malicious software survives system reboots?

Choose the correct answer below:

Skip Quiz Review Instruction