adplus-dvertising
frame-decoration

Question

What should penetration testers consider when planning data exfiltration techniques?

a.

Make data transfers large via SSH to an unknown host.

b.

Use well-known sites like GitHub or Facebook for data transfers.

c.

Make it easy to determine that the data leaving belongs to the organization.

d.

Use protocols like DNS for secure data transfer.

Answer: (b).Use well-known sites like GitHub or Facebook for data transfers. Explanation:Penetration testers should consider using well-known sites like GitHub or Facebook for data transfers to make it hard to determine that the data leaving belongs to the organization or is sensitive.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What should penetration testers consider when planning data exfiltration techniques?

Similar Questions

Discover Related MCQs

Q. What is a common method for creating a new user account on a compromised Windows system using Metasploit's Meterpreter?

Q. What is the purpose of pivoting in the context of penetration testing?

Q. How can a compromised system be leveraged for pivoting in penetration testing?

Q. What can help slow down defenders if there is a possibility that the tools may be discovered?

Q. What is emphasized as a key part of covering tracks in terms of communications between the target system and a penetration tester's workstation?

Q. What is the purpose of vulnerability and exploit databases for penetration testers?

Q. What are some tools that penetration testers often use for creating and maintaining a foothold?

Q. What is a first step in post-exploitation activities after successfully exploiting systems?

Q. What is important for concealing and retaining long-term access during post-exploitation activities?

Q. What is the purpose of tools like Empire, Mimikatz, and BloodHound for penetration testers?

Q. What is an important task for penetration testers who gain access to their targets?

Q. What is the significance of creating and maintaining a foothold in penetration testing?

Q. What is an important aspect of avoiding detection?

Q. What does covering your tracks involve in penetration testing?

Q. Alice discovers a rating that her vulnerability scanner lists as 9.3 out of 10 on its severity scale. The service that is identified runs on TCP 445. What type of exploit is Alice most likely to use on this service?

Q. Charles has recently completed a vulnerability scan of a system and needs to select the best vulnerability to exploit from the following listing.
Which of the entries should Charles prioritize from this list if he wants to gain access to the system?

Q. Charles has recently completed a vulnerability scan of a system and needs to select the best vulnerability to exploit from the following listing.
If Charles wants to build a list of additional system user accounts, which of the vulnerabilities
is most likely to deliver that information?

Q. Charles has recently completed a vulnerability scan of a system and needs to select the best vulnerability to exploit from the following listing.
If Charles selects the Ruby on Rails vulnerability, which of the following methods cannot be
used to search for an existing Metasploit vulnerability?

Q. Matt wants to pivot from a Linux host to other hosts in the network but is unable to install additional tools beyond those found on a typical Linux server. How can he leverage the system he is on to allow vulnerability scans of those remote hosts if they are firewalled against inbound connections and protected from direct access from his penetration testing workstation?

Q. After gaining access to a Windows system, Fred uses the following command:
SchTasks /create /SC Weekly /TN "Antivirus" /TR "C:\Users\SSmith\av.exe" /ST 09:00

What has he accomplished?