CompTIA PenTest+ PT0-002 Practice Question
During a penetration testing engagement, you have established persistent access on a target system. Which of the following methods is the BEST to mask your continued presence from the system administrators?
Frequently changing file and directory permissions to maintain access
Installing a rootkit to conceal the presence of your tools and activities
Renaming all penetration testing tools with system default process names
Cleaning all log files daily to remove any trace of unauthorized access
Hosting all backdoor connections on non-standard ports to avoid attention
Disabling all logging services on the target system