ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 307 - PT0-002 discussion

Report
Export

Penetration tester who was exclusively authorized to conduct a physical assessment noticed there were no cameras pointed at the dumpster for company. The penetration tester returned at night and collected garbage that contained receipts for recently purchased networking :. The models of equipment purchased are vulnerable to attack. Which of the following is the most likely next step for the penetration?

A.
Alert the target company of the discovered information.
Answers
A.
Alert the target company of the discovered information.
B.
Verify the discovered information is correct with the manufacturer.
Answers
B.
Verify the discovered information is correct with the manufacturer.
C.
Scan the equipment and verify the findings.
Answers
C.
Scan the equipment and verify the findings.
D.
Return to the dumpster for more information.
Answers
D.
Return to the dumpster for more information.
Suggested answer: C

Explanation:

The most likely next step for the penetration tester is to scan the equipment and verify the findings, which is a process of using tools or techniques to probe or test the target equipment for vulnerabilities or weaknesses that can be exploited. Scanning and verifying the findings can help the penetration tester confirm that the models of equipment purchased are vulnerable to attack, and identify the specific vulnerabilities or exploits that affect them. Scanning and verifying the findings can also help the penetration tester prepare for the next steps of the assessment, such as exploiting or reporting the vulnerabilities. Scanning and verifying the findings can be done by using tools such as Nmap, which can scan hosts and networks for ports, services, versions, OS, or other information1, or Metasploit, which can exploit hosts and networks using various payloads or modules2. The other options are not likely next steps for the penetration tester. Alerting the target company of the discovered information is not a next step, but rather a final step, that involves reporting the findings and recommendations to the client after completing the assessment. Verifying the discovered information with the manufacturer is not a next step, as it may not provide accurate or reliable information about the vulnerabilities or exploits that affect the equipment, and it may also alert the manufacturer or the client of the assessment. Returning to the dumpster for more information is not a next step, as it may not yield any more useful or relevant information than what was already collected from the receipts.

asked 02/10/2024
Felipe Santos Cardoso
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first