exam questions

Exam PT1-002 All Questions

View all questions & answers for the PT1-002 exam

Exam PT1-002 topic 1 question 49 discussion

Actual exam question from CompTIA's PT1-002
Question #: 49
Topic #: 1
[All PT1-002 Questions]

Which of the following should a penetration tester do NEXT after identifying that an application being tested has already been compromised with malware?

  • A. Analyze the malware to see what it does.
  • B. Collect the proper evidence and then remove the malware.
  • C. Do a root-cause analysis to find out how the malware got in.
  • D. Remove the malware immediately.
  • E. Stop the assessment and inform the emergency contact.
Show Suggested Answer Hide Answer
Suggested Answer: E 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Isuzu
Highly Voted 3 years, 7 months ago
Does penetration tester role is to remove malware found on or just to discover malware and report with recommendation? I think correct answer is E
upvoted 9 times
...
strawberryspring
Highly Voted 3 years, 1 month ago
It’s E. You’re getting paid to do an assessment, no to remediate. Not your circus, not your monkeys. Besides, what if their secops team wants to further investigate and you remove the malware found.
upvoted 5 times
...
bieecop
Most Recent 1 year, 9 months ago
Selected Answer: B
After identifying that an application being tested has already been compromised with malware, the penetration tester should prioritize the collection of proper evidence before taking any further actions. It is important to gather evidence to understand the nature of the compromise, identify the malware involved, and document the impact it has had on the system or application.
upvoted 1 times
bieecop
1 year, 9 months ago
Once the necessary evidence has been collected, the penetration tester should proceed with removing the malware from the compromised system or application. This step is important to restore the integrity and security of the system and prevent further damage or unauthorized access.
upvoted 1 times
bieecop
1 year, 9 months ago
After removing the malware, additional steps can be taken, such as analyzing the malware to understand its behavior, performing a root-cause analysis to determine how the malware entered the system, and informing the relevant parties, such as the client or system administrators, about the incident. However, the immediate priority should be to mitigate the compromise by removing the malware and securing the affected system.
upvoted 1 times
...
...
...
Charlieb123
3 years ago
Selected Answer: E
E - standard procedure when you establish an active/current security breach, is to stop the test an inform the Emergency Contact.
upvoted 4 times
...
BinarySoldier
3 years, 2 months ago
Selected Answer: E
E it's.
upvoted 3 times
...
tokhs
3 years, 4 months ago
I would go with E
upvoted 3 times
...
BinarySoldier
3 years, 5 months ago
E is the correct answer.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago