CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA PenTest+ PT0-002 Practice Question

During a penetration testing engagement, you have established persistent access on a target system. Which of the following methods is the BEST to mask your continued presence from the system administrators?

  • Hosting all backdoor connections on non-standard ports to avoid attention

  • Disabling all logging services on the target system

  • Frequently changing file and directory permissions to maintain access

  • Installing a rootkit to conceal the presence of your tools and activities

  • Cleaning all log files daily to remove any trace of unauthorized access

  • Renaming all penetration testing tools with system default process names

Subscribe to avoid duplicate questions and track your progress over time
This question is for objective:
Attacks and Exploits
Your Score:
Attacks and Exploits
Information Gathering and Vulnerability Scanning
Reporting and Communication
Tools and Code Analysis
Planning and Scoping