A red-team tester has been contracted to emulate the threat posed by a malicious insider on a company's network, with the constrained objective of gaining access to sensitive personnel files. During the assessment, the red-team tester identifies an artifact indicating possible prior compromise within the target environment. Which of the following actions should the tester take?
A) Perform forensic analysis to isolate the means of compromise and determine attribution.
B) Incorporate the newly identified method of compromise into the red team's approach.
C) Create a detailed document of findings before continuing with the assessment.
D) Halt the assessment and follow the reporting procedures as outlined in the contract.
Correct Answer:
Verified
Q28: A company that requires minimal disruption to
Q29: A penetration tester wants to identify CVEs
Q30: A penetration tester is testing a web
Q31: A penetration tester who is conducting a
Q32: A penetration tester has completed an analysis
Q34: A penetration tester wants to scan a
Q35: A penetration tester runs the following command
Q36: A penetration tester has obtained root access
Q37: A penetration tester logs in as a
Q38: A software development team is concerned that
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents