exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 230 discussion

Actual exam question from CompTIA's PT0-002
Question #: 230
Topic #: 1
[All PT0-002 Questions]

A penetration tester successfully infiltrated the targeted web server and created credentials with administrative privileges. After conducting data exfiltration, which of the following should be the tester’s NEXT step?

  • A. Determine what data is available on the web server.
  • B. Change or delete the logs.
  • C. Log out and migrate to a new session.
  • D. Log in as the new user.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Myfeedins479
Highly Voted 1 year ago
Selected Answer: B
According to the CompTIA PenTest+ Study Guide, "Post‐exploitation activities also include cleanup, concealment, and retaining access for longer‐term penetration testing activities. You should make sure you know how to hide the evidence of your actions by cleaning up log files, removing the files created by your tools, and ensuring that other artifacts are not easily discoverable by defenders."
upvoted 5 times
...
killwitch
Most Recent 2 months, 1 week ago
Selected Answer: C
C. Log out and migrate to a new session. Never delete Client logs.
upvoted 1 times
...
Nikamy
5 months, 1 week ago
Selected Answer: C
Ok this is hard question. Normally you cleanup, clear logs. However if this is a real pentest for a client you should never remove logs unless told so...
upvoted 1 times
...
Big_Dre
1 year ago
Selected Answer: C
you should never delete or modify logs
upvoted 4 times
...
DRVision
1 year, 5 months ago
Selected Answer: C
You should never modify or delete logs of a client as they need these to be able to remediate and identify methodologies. You should migrate to a new session to avoid detection and continue with the penetration testing
upvoted 3 times
...
solutionz
1 year, 8 months ago
Selected Answer: B
This step helps in covering the tracks of the tester and makes it more difficult for defenders to understand exactly what was done during the penetration test. This is a typical step in the post-exploitation phase of a penetration test, especially when the goal is to simulate the behavior of an actual attacker and assess the organization's ability to detect and respond to the breach. The other options do not follow the logical progression of a penetration test after the described actions have already been taken.
upvoted 1 times
...
[Removed]
2 years ago
Selected Answer: C
The next step for the penetration tester after conducting data exfiltration should be to log out and migrate to a new session. This will help to cover their tracks and minimize the chances of being detected. Changing or deleting the logs may also be a good idea to avoid being discovered, but it should not be the next step since the penetration tester may need to access the system later on for additional attacks or data exfiltration. Determining what data is available on the web server and logging in as the new user are also not appropriate next steps since the penetration tester has already accomplished their goals by successfully infiltrating the server and exfiltrating data.
upvoted 1 times
...
cy_analyst
2 years ago
Selected Answer: C
Logging out and migrating to a new session would be the best option for the penetration tester’s next step in this scenario because it would allow them to maintain access to the system while avoiding detection.
upvoted 1 times
...
cy_analyst
2 years ago
you should never modify of delete the logs on any machine.
upvoted 2 times
...
KingIT_ENG
2 years, 1 month ago
answer B
upvoted 2 times
...
[Removed]
2 years, 1 month ago
B is the answer
upvoted 2 times
...
kenechi
2 years, 1 month ago
Selected Answer: B
B - Delete the log files or change the log files using time stomp. This will not show that the data has been modified.
upvoted 4 times
...
Frog_Man
2 years, 1 month ago
D is my answer.
upvoted 1 times
[Removed]
2 years, 1 month ago
Your answer is wrong B is the correct answer
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago