List of questions
Related questions
Question 33 - PT0-002 discussion
A penetration tester is reviewing the following SOW prior to engaging with a client:
"Network diagrams, logical and physical asset inventory, and employees' names are to be treated as client confidential. Upon completion of the engagement, the penetration tester will submit findings to the client's Chief Information Security Officer (CISO) via encrypted protocols and subsequently dispose of all findings by erasing them in a secure manner." Based on the information in the SOW, which of the following behaviors would be considered unethical? (Choose two.)
A.
Utilizing proprietary penetration-testing tools that are not available to the public or to the client for auditing and inspection
B.
Utilizing public-key cryptography to ensure findings are delivered to the CISO upon completion of the engagement
C.
Failing to share with the client critical vulnerabilities that exist within the client architecture to appease the client's senior leadership team
D.
Seeking help with the engagement in underground hacker forums by sharing the client's public IP address
E.
Using a software-based erase tool to wipe the client's findings from the penetration tester's laptop
F.
Retaining the SOW within the penetration tester's company for future use so the sales team can plan future engagements
Your answer:
0 comments
Sorted by
Leave a comment first