Question
a.
To execute a script that performs harmless actions on the compromised system.
b.
To schedule tasks that run only during the daytime.
c.
To retain access to systems by initiating connections to a controlled system on a regular basis.
d.
To automate the removal of malware from the compromised system.
Posted under CompTIA PenTest+ Certification Exam PT0 002
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What is the purpose of using a "call home" script in scheduled tasks?
Similar Questions
Discover Related MCQs
Q. What is the primary function of Responder in the context of SMB services?
View solution
Q. What protocol is used by SMB for file-sharing, authentication, authorization, and print services?
View solution
Q. What is the primary purpose of SecureAuth’s Impacket toolset?
View solution
Q. Which Impacket tool replicates the functionality of PsExec in Python?
View solution
Q. What is the objective of pass-the-hash attacks in penetration testing?
View solution
Q. How can mitm6 be used in a DNS attack?
View solution
Q. What does LSASS.exe stand for in the context of pass-the-hash attacks?
View solution
Q. Which port is commonly associated with Windows Remote Desktop Protocol (RDP)?
View solution
Q. In the context of Apple's Remote Desktop (ARD), how do penetration testers often use ARD?
View solution
Q. What is the primary advantage of VNC as a remote desktop tool in penetration testing?
View solution
Q. How does DNS attack tool mitm6 exploit a Windows DNS server?
View solution
Q. What is a potential disadvantage of using fileless malware in penetration testing?
View solution
Q. How can a penetration tester schedule a task on a Windows system using the command line?
View solution
Q. What is one common method of exploiting SSH vulnerabilities?
View solution
Q. How can long-term access to systems be achieved by exploiting SSH keys?
View solution
Q. What is the primary focus of testing network segmentation in the context of penetration testing?
View solution
Q. What is a method used by tools allowing VLAN hopping?
View solution
Q. What is the purpose of tools like TruffleHog in the context of penetration testing?
View solution
Q. Where are unintentionally exposed secret keys frequently found?
View solution
Q. What is the primary purpose of post-exploit attacks in penetration testing?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond CompTIA PenTest+ Certification Exam PT0 002? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!
Cyber Security
Understand the fundamentals of safeguarding digital assets with our Cyber Security...
Java Programming
Level up your coding skills with our Java Programming MCQs. From object-oriented...