Multiple Choice
A red-team tester has been contracted to emulate the threat posed by a malicious insider on a company's network, with the constrained objective of gaining access to sensitive personnel files. During the assessment, the red-team tester identifies an artifact indicating possible prior compromise within the target environment. Which of the following actions should the tester take?
A) Perform forensic analysis to isolate the means of compromise and determine attribution.
B) Incorporate the newly identified method of compromise into the red team's approach.
C) Create a detailed document of findings before continuing with the assessment.
D) Halt the assessment and follow the reporting procedures as outlined in the contract.
Correct Answer:

Verified
Correct Answer:
Verified
Q15: A penetration tester has completed an analysis
Q16: A penetration tester obtained the following results
Q17: A penetration tester is preparing to perform
Q18: Given the following output: User-agent:* Disallow: /author/
Q19: Which of the following documents describes specific
Q21: A penetration tester recently performed a social-engineering
Q22: Which of the following should a penetration
Q23: A penetration tester performs the following command:
Q24: A consultant is reviewing the following output
Q25: A penetration tester is testing input validation