A should be the correct one. It isn't saying "Pentesting" so you assume that in "testing"stage, developers and engineers should be able to disable the network port of the affected service.
when a pen tester encounters evidence of a compromised system, should IRT be notified to ensure that the organisation is aware of the attack.
if the evidence appears to be "fresh", the pen-test might need to be suspended until the security breach is handled. if it is historical, the pen test team should log the discovery and continue with the task at hand.
on the real world all this depends on your arrangement with the client.
answer is C. Discovery of a critical finding. If the penetration test identifies a critical issue with the
security of the client’s environment, the testers should not wait for the delivery of their
final report to communicate this issue to management. Leaving a critical vulnerability
unaddressed may put the organization at an unacceptable level of risk and result in a
compromise. Penetration testers who discover and validate the presence of a critical
issue should follow the procedures outlined in the statement of work to immediately
notify management of the issue, even if this notification reduces the degree of penetration that the testers are able to achieve during the test. verbatim whats in the book.
Even if a finding is critical you do not interfere with the network or systems. Only evidence of an attack or current attack would require the action of reaching out to the client. Vuln scans would report on all vulns, not just critical.
PenTest+ Study Guide - Sybex
Discovery of a critical finding. If the penetration test identifies a critical issue with the
security of the client’s environment, the testers should not wait for the delivery of their
final report to communicate this issue to management. Leaving a critical vulnerability
unaddressed may put the organization at an unacceptable level of risk and result in a
compromise. Penetration testers who discover and validate the presence of a critical
issue should follow the procedures outlined in the statement of work to immediately
notify management of the issue, even if this notification reduces the degree of penetration that the testers are able to achieve during the test.
Only alert the client in times of service outages or signs of compromise. If i find a vuln with a CVSS of 10, I'm going to continue my engagement until I discover all findings. Therefore the answer is actually B
Also you 110% would NOT shut down the service. I.E. legacy systems. Network segmentation would be a takeaway here. As a pentester you DO NOT actively make changes to the environment. Your goal is to identify key points of vulnerabilities and weaknesses, not exploit them UNLESS determined in the ROE
The correct answer is C 'Promptly alert the client with details of the finding.' according to the CompTIA Pentest+ Practice Test, Sybex.
Note: In this scenario, since the penetration tester discovered a critical vulnerability, the
tester should immediately alert the client with the details of the findings.
This section is not available anymore. Please use the main Exam Page.PT0-001 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Leonar
Highly Voted 4 years, 9 months agophatboy
Highly Voted 5 years, 7 months agokloug
Most Recent 2 years, 2 months agobromings
2 years, 6 months agomiabe
2 years, 9 months agoJetlife
3 years agomaps7
3 years ago[Removed]
3 years, 1 month agobaybay
3 years, 1 month agoSamAJames
3 years, 1 month agoRTFM
3 years, 2 months agoCock
3 years, 2 months agoAriel235788
3 years, 4 months agoDrChats
3 years, 4 months agocontender
3 years, 4 months agoAriel235788
3 years, 5 months agoAriel235788
3 years, 5 months agoAriel235788
3 years, 5 months agoCybeSecN
3 years, 9 months ago