Free CompTIA PenTest+ PT0-002 Practice Question

During a penetration testing engagement, you have established persistent access on a target system. Which of the following methods is the BEST to mask your continued presence from the system administrators?

  • Frequently changing file and directory permissions to maintain access

  • Installing a rootkit to conceal the presence of your tools and activities

  • Renaming all penetration testing tools with system default process names

  • Hosting all backdoor connections on non-standard ports to avoid attention

  • Cleaning all log files daily to remove any trace of unauthorized access

  • Disabling all logging services on the target system

This question's topic:
CompTIA PenTest+ PT0-002 / 
Attacks and Exploits
Your Score:

Check or uncheck an objective to set which questions you will receive.