List of questions
Related questions
Question 393 - SY0-601 discussion
A network penetration tester has successfully gained access to a target machine. Which of the following should the penetration tester do next?
A.
Clear the log files of all evidence
B.
Move laterally to another machine.
C.
Establish persistence for future use.
D.
Exploit a zero-day vulnerability.
Your answer:
0 comments
Sorted by
Leave a comment first