CompTIA PenTest+ PT0-002 Practice Question

During a penetration testing engagement, you have established persistent access on a target system. Which of the following methods is the BEST to mask your continued presence from the system administrators?

  • Disabling all logging services on the target system

  • Hosting all backdoor connections on non-standard ports to avoid attention

  • Frequently changing file and directory permissions to maintain access

  • Renaming all penetration testing tools with system default process names

  • Cleaning all log files daily to remove any trace of unauthorized access

  • Installing a rootkit to conceal the presence of your tools and activities

CompTIA PenTest+ PT0-002
Attacks and Exploits
Your Score:
Settings & Objectives

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot