🎖️🏵️ Memorial Weekend Sale — 30% off🏵️🎖️

1 day, 1 hour remaining!
CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA PenTest+ PT0-002 Practice Question

During a penetration test, you have successfully exploited a vulnerability on a target system. Which of the following options is the BEST method to establish a persistent and covert remote access channel?

  • Configure a VPN connection back to the attacker’s machine

  • Deploy a reverse shell with a listener on the attacker's machine

  • Set up an SSH server on the target system for remote access

  • Install a new remote desktop software package on the target system

This question is for objective:
Tools and Code Analysis
Your Score:
Tools and Code Analysis
Information Gathering and Vulnerability Scanning
Attacks and Exploits
Reporting and Communication
Planning and Scoping