CompTIA PenTest+ PT0-002 Practice Question

During a penetration testing engagement, you have established persistent access on a target system. Which of the following methods is the BEST to mask your continued presence from the system administrators?

  • Frequently changing file and directory permissions to maintain access

  • Installing a rootkit to conceal the presence of your tools and activities

  • Renaming all penetration testing tools with system default process names

  • Cleaning all log files daily to remove any trace of unauthorized access

  • Hosting all backdoor connections on non-standard ports to avoid attention

  • Disabling all logging services on the target system

CompTIA PenTest+ PT0-002
Attacks and Exploits
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot