Multiple Choice
A penetration tester used an ASP.NET web shell to gain access to a web application, which allowed the tester to pivot in the corporate network. Which of the following is the MOST important follow-up activity to complete after the tester delivers the report?
A) Removing shells
B) Obtaining client acceptance
C) Removing tester-created credentials
D) Documenting lessons learned
E) Presenting attestation of findings
Correct Answer:

Verified
Correct Answer:
Verified
Q72: A penetration tester has obtained access to
Q73: A penetration tester observes that several high-numbered
Q74: During a penetration test, a tester identifies
Q75: A penetration tester is connected to a
Q76: A client asks a penetration tester to
Q78: Consumer-based IoT devices are often less secure
Q79: Which of the following properties of the
Q80: A company contracted a firm specializing in
Q81: A security consultant is trying to attack
Q82: A penetration tester has compromised a host.