🎖️🏵️ Memorial Weekend Sale — 30% off🏵️🎖️

1 day, 16 hours remaining!
CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA PenTest+ PT0-002 Practice Question

You are tasked with a penetration test for a financial institution and have been given a comprehensive list of digital assets to evaluate. Midway through your assessment, you discover a service running on an endpoint that is outside the predefined range. This endpoint appears to be hosting a critical application. Which of the following actions align with the best practices for maintaining the scope of engagement?

  • Close the service immediately upon discovery to minimize the risk of potential exploitation and notify the client afterwards.

  • Proceed with examining the service, since it might be critical to the client's security posture, and document any findings.

  • Notify your point of contact or the project lead about the discovery and await further instructions.

  • Dismiss the finding to stay within the original stipulations and avoid any unauthorized probing of systems.

This question is for objective:
Planning and Scoping
Your Score:
Planning and Scoping
Information Gathering and Vulnerability Scanning
Attacks and Exploits
Reporting and Communication
Tools and Code Analysis