CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA PenTest+ PT0-002 Practice Question

During a penetration test, you decide to use a post-exploitation command and control framework to maintain access and execute .NET assemblies in the target's environment. You have gained initial access via a phishing campaign and determined that the target network uses a significant amount of Microsoft technology. Which tool would be most appropriate for managing the compromised hosts while staying stealthy and facilitating further network exploration?

  • Covenant

  • Burp Suite

  • WPScan

  • Responder

This question is for objective:
Tools and Code Analysis
Your Score:
Tools and Code Analysis
Information Gathering and Vulnerability Scanning
Attacks and Exploits
Reporting and Communication
Planning and Scoping