Free CompTIA PenTest+ PT0-002 Practice Question

During a penetration test, you decide to use a post-exploitation command and control framework to maintain access and execute .NET assemblies in the target's environment. You have gained initial access via a phishing campaign and determined that the target network uses a significant amount of Microsoft technology. Which tool would be most appropriate for managing the compromised hosts while staying stealthy and facilitating further network exploration?

  • Burp Suite

  • Covenant

  • WPScan

  • Responder

This question's topic:
CompTIA PenTest+ PT0-002 / 
Tools and Code Analysis
Your Score:

Check or uncheck an objective to set which questions you will receive.