adplus-dvertising
frame-decoration

Question

What is the recommended action for penetration testers who discover indicators of an ongoing or past compromise?

a.

Ignore the indicators and proceed with the test

b.

Immediately inform management and recommend activating the incident response process

c.

Document the findings and report them in the final report

d.

Wait until the next scheduled communication to inform management

Answer: (b).Immediately inform management and recommend activating the incident response process Explanation:Penetration testers should immediately inform management and recommend activating the incident response process when discovering indicators of an ongoing or past compromise.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What is the recommended action for penetration testers who discover indicators of an ongoing or past compromise?

Similar Questions

Discover Related MCQs

Q. Why is reprioritizing the goals of a penetration test considered acceptable?

Q. What is emphasized regarding reprioritization in the world of penetration testing?

Q. What is the primary objective of recommending mitigation strategies in a penetration test?

Q. Why are penetration testers uniquely suited to recommend ways to remediate discovered flaws?

Q. In the context of penetration testing, what do technical controls primarily provide defense against?

Q. What is an example of an administrative control?

Q. How do physical controls contribute to security in a penetration test?

Q. What risk might an organization address by implementing an employee awareness campaign, a new business process for wire transfers, and email content filtering simultaneously?

Q. How can organizations remediate the vulnerability of weak password complexity?

Q. What is the disadvantage of storing passwords in plaintext on a server?

Q. Why is the risk of storing passwords in plaintext significant, even after a system has been compromised?

Q. What is the recommended solution for preventing passwords stored on a server from being easily accessible to attackers?

Q. Why might the reliance on passwords pose a serious security risk?

Q. What is multifactor authentication?

Q. Which category of multifactor authentication involves physical objects as authentication mechanisms?

Q. What qualifies as multifactor authentication?

Q. What is one of the most common findings in penetration test reports?

Q. According to CompTIA, what are the two techniques for remediating SQL injection vulnerabilities?

Q. Why do unnecessary open services pose a security risk?

Q. What is the recommended solution for addressing unnecessary open services?