During final steps of an assessment, an analyst finds leftover infiltration software on targeted systems. Which measure best ensures future stability for these systems?
Retain infiltration software for potential reentry
Rename leftover infiltration software to mislead security scanners
Delete all remaining infiltration software from system directories
Overwrite infiltration software with identical decoy data
Eliminating infiltration software prevents future exploitation and preserves the environment’s integrity. Renaming utilities or overwriting them with decoy data can leave traces or create confusion for subsequent security audits. Retaining infiltration files goes against standard cleanup practices and exposes the environment to unnecessary risk.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to delete infiltration software after an assessment?
Open an interactive chat with Bash
What risks are associated with retaining infiltration software on a system?
Open an interactive chat with Bash
What are security audits, and why can leftover infiltration software affect them?