exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 72 discussion

Actual exam question from CompTIA's PT0-002
Question #: 72
Topic #: 1
[All PT0-002 Questions]

A penetration tester is cleaning up and covering tracks at the conclusion of a penetration test. Which of the following should the tester be sure to remove from the system? (Choose two.)

  • A. Spawned shells
  • B. Created user accounts
  • C. Server logs
  • D. Administrator accounts
  • E. Reboot system
  • F. ARP cache
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Manzer
Highly Voted 2 years, 10 months ago
Selected Answer: AB
Remove created accounts and spawned shells.
upvoted 10 times
...
masso435
Highly Voted 2 years, 8 months ago
Selected Answer: AB
The top three actions CompTIA state Remove Shells Remove Tester-Created Accounts Remove Tools
upvoted 7 times
...
yeti87
Most Recent 1 year, 5 months ago
Selected Answer: AB
Should be „spawned shells“ and „created accounts“: Some common cleanup tasks can include, but are not limited to: • Delete any new files you created from the affected systems. • Remove any credentials or accounts you created from the affected systems. • Restore any original configurations you modified. • Restore any original files that you modified or otherwise compromised. • Restore any log files you deleted. • Restore any original log files you modified or otherwise compromised. • Remove any shells, RATs, or other backdoors from the affected systems. • Remove any additional tools you may have left on the affected systems. • Purge any sensitive data exposed in plaintext. • Restore a clean backup copy of any apps that you compromised.
upvoted 2 times
...
KeToopStudy
1 year, 7 months ago
Selected Answer: AB
AB seems to be the most critical
upvoted 1 times
...
xviruz2kx
2 years, 4 months ago
Selected Answer: AC
The penetration tester should be sure to remove the spawned shells and server logs from the system. So the correct options are: A. Spawned shells C. Server logs
upvoted 1 times
CCSXorabove
1 year ago
After de conclusion, if you have removed the logs you need to restore this logs and not keep removed.
upvoted 1 times
...
...
bfett21
2 years, 4 months ago
Selected Answer: AB
A and B
upvoted 1 times
...
cy_analyst
2 years, 5 months ago
Selected Answer: AC
It is generally more important to remove spawned shells and server logs than user accounts. Spawned shells should be removed first to ensure that no unauthorized access can be gained to the system in the future. These shells may have been created by the penetration tester during the test and could potentially be used by an attacker to gain access to the system. Server logs should also be removed or cleaned up to ensure that no evidence of the penetration test remains on the system that could be used to trace the tester's activities. This is important to maintain the confidentiality of the test results and prevent any unintended consequences or negative impact on the organization being tested.
upvoted 1 times
KingIT_ENG
2 years, 5 months ago
A and B is right answer
upvoted 1 times
...
cy_analyst
2 years, 4 months ago
Yes A and B are correct. During a penetration test, it is common practice for a tester to modify the logs to remove any evidence of the test or to make it more difficult for an attacker to detect their activities. This can be achieved by disabling logging of specific events, modifying the timestamps or other fields in the logs, or using tools that overwrite or scramble log data.
upvoted 1 times
...
...
beamage
2 years, 5 months ago
Selected Answer: BC
Book States B and C
upvoted 1 times
[Removed]
2 years, 5 months ago
A and B read again
upvoted 2 times
...
...
kloug
2 years, 6 months ago
a,c correct
upvoted 1 times
kloug
2 years, 6 months ago
Sorry a,b correct
upvoted 3 times
...
...
RRabbit_111
2 years, 7 months ago
A. Spawned shells B. Created user accounts At the conclusion of a penetration test, it is important for the tester to clean up and cover tracks by removing any changes or modifications made to the system during the test. Two important things that the tester should be sure to remove are: Spawned shells: Any shells created by the tester during the test should be removed to prevent unauthorized access to the system. Created user accounts: Any user accounts created by the tester should be removed to prevent unauthorized access to the system. It is important to note that options C, D, E, and F are not related to the task which is removing the changes or modifications made to the system during the test. Server logs, Administrator accounts, and Rebooting the system are important but they are not related to covering tracks. ARP cache is a table that contains the mappings of IP addresses to MAC addresses, which is used by the network to send packets to a specific host. It is not related to the task which is cleaning up and covering tracks at the conclusion of a penetration test.
upvoted 5 times
...
petercorn
2 years, 9 months ago
Selected Answer: AB
»»Removing shells: Remove any shell programs installed when performing the pentest. »»Removing tester-created credentials: Be sure to remove any user accounts created during the pentest. This includes backdoor accounts. »»Removing tools: Remove any software tools that were installed on the customer’s systems that were used to aid in the exploitation of systems.
upvoted 5 times
...
mj944
2 years, 10 months ago
Selected Answer: AB
remove created creds, shells, tools
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...