Under the "Post-attack Phase and Activities", it is the responsibility of the tester to restore the systems to a pre-test state. Which of the following activities should not be included in this phase? (see exhibit) Exhibit:
Suggested Answer:D🗳️
The post-attack phase revolves around returning any modified system(s) to the pretest state. Examples of such activities: ✑ Removal of any files, tools, exploits, or other test-created objects uploaded to the system during testing ✑ Removal or reversal of any changes to the registry made during system testing References: Computer and Information Security Handbook, John R. Vacca (2012), page 531
It should be C: III and IV. While the first part of IV sounds good, you should NOT maintain a backdoor
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.EC0-350 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
[Removed]
3 years, 4 months ago