ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 77 - PT0-002 discussion

Report
Export

A red-team tester has been contracted to emulate the threat posed by a malicious insider on a company's network, with the constrained objective of gaining access to sensitive personnel files.

During the assessment, the red-team tester identifies an artifact indicating possible prior compromise within the target environment.

Which of the following actions should the tester take?

A.
Perform forensic analysis to isolate the means of compromise and determine attribution.
Answers
A.
Perform forensic analysis to isolate the means of compromise and determine attribution.
B.
Incorporate the newly identified method of compromise into the red team's approach.
Answers
B.
Incorporate the newly identified method of compromise into the red team's approach.
C.
Create a detailed document of findings before continuing with the assessment.
Answers
C.
Create a detailed document of findings before continuing with the assessment.
D.
Halt the assessment and follow the reporting procedures as outlined in the contract.
Answers
D.
Halt the assessment and follow the reporting procedures as outlined in the contract.
Suggested answer: D

Explanation:

Halting the assessment and following the reporting procedures as outlined in the contract is the best action to take after identifying that an application being tested has already been compromised with malware. This is because continuing the assessment might interfere with an ongoing investigation or compromise evidence collection. The reporting procedures are part of the contract that specifies how to handle any critical issues or incidents during the penetration testing engagement. They should include details such as who to contact, what information to provide, and what steps to follow.

asked 02/10/2024
Aygul Korkmazlar
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first