ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 33 - PT0-002 discussion

Report
Export

A penetration tester is reviewing the following SOW prior to engaging with a client:

"Network diagrams, logical and physical asset inventory, and employees' names are to be treated as client confidential. Upon completion of the engagement, the penetration tester will submit findings to the client's Chief Information Security Officer (CISO) via encrypted protocols and subsequently dispose of all findings by erasing them in a secure manner." Based on the information in the SOW, which of the following behaviors would be considered unethical? (Choose two.)

A.
Utilizing proprietary penetration-testing tools that are not available to the public or to the client for auditing and inspection
Answers
A.
Utilizing proprietary penetration-testing tools that are not available to the public or to the client for auditing and inspection
B.
Utilizing public-key cryptography to ensure findings are delivered to the CISO upon completion of the engagement
Answers
B.
Utilizing public-key cryptography to ensure findings are delivered to the CISO upon completion of the engagement
C.
Failing to share with the client critical vulnerabilities that exist within the client architecture to appease the client's senior leadership team
Answers
C.
Failing to share with the client critical vulnerabilities that exist within the client architecture to appease the client's senior leadership team
D.
Seeking help with the engagement in underground hacker forums by sharing the client's public IP address
Answers
D.
Seeking help with the engagement in underground hacker forums by sharing the client's public IP address
E.
Using a software-based erase tool to wipe the client's findings from the penetration tester's laptop
Answers
E.
Using a software-based erase tool to wipe the client's findings from the penetration tester's laptop
F.
Retaining the SOW within the penetration tester's company for future use so the sales team can plan future engagements
Answers
F.
Retaining the SOW within the penetration tester's company for future use so the sales team can plan future engagements
Suggested answer: C, D

Explanation:

These two behaviors would be considered unethical because they violate the principles of honesty, integrity, and confidentiality that penetration testers should adhere to. Failing to share critical vulnerabilities with the client would be dishonest and unprofessional, as it would compromise the quality and value of the assessment and potentially expose the client to greater risks. Seeking help in underground hacker forums by sharing the client's public IP address would be a breach of confidentiality and trust, as it would expose the client's identity and information to malicious actors who may exploit them.

asked 02/10/2024
Cyrom Meryll Santos
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first