Maintaining access in the penetration testing life cycle is accomplished using rootkits or trojan horse programs.
The 5 levels of penetration testing life cycle. There are 5 penetration testing phases: reconnaissance, scanning, vulnerability evaluation, exploitation, and reporting.
A penetration check (pen test) is a certified simulated assault completed on a computer system to assess its safety. Penetration testers use identical equipment, techniques, and tactics as attackers to find and exhibit the commercial enterprise influences of weaknesses in a machine.
Learn more about penetration testing life cycle here:https://brainly.com/question/28341184
#SPJ4