Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-002 Topic 1 Question 44 Discussion

Actual exam question for CompTIA's PT0-002 exam
Question #: 44
Topic #: 1
[All PT0-002 Questions]

A penetration tester is conducting an assessment for an e-commerce company and successfully copies the user database to the local machine. After a closer review, the penetration tester identifies several high-profile celebrities who have active user accounts with the online service. Which of the following is the most appropriate next step?

Show Suggested Answer Hide Answer
Suggested Answer: C

The most likely explanation for why a penetration tester cannot scan a server that was previously scanned successfully is that the IP address is on the blocklist. Blocklists are used to prevent malicious actors from scanning servers, and if the IP address of the server is on the blocklist, the scanning process will be blocked.


Contribute your Thoughts:

Felice
3 days ago
Definitely need to contact the client ASAP on this one. Those celebrity accounts could be a goldmine for malicious actors. Can't just sit on that information, gotta nip it in the bud before it becomes a bigger problem.
upvoted 0 times
...
Tiera
7 days ago
But shouldn't we also delete the high-profile accounts to protect their privacy?
upvoted 0 times
...
Lonny
9 days ago
I agree with Shaun, it's important to inform the client.
upvoted 0 times
...
Shaun
10 days ago
We should immediately contact the client.
upvoted 0 times
...
Richelle
11 days ago
Whoa, that's a lot of high-profile accounts! I'd be tempted to just delete them and call it a day, but that's probably not the best approach. Better to play by the rules and report it to the client. They can decide how to handle it.
upvoted 0 times
...
Javier
14 days ago
Hmm, this is a tricky one. Contacting the celebrities directly could be seen as a violation of their privacy. Deleting the accounts may raise more issues than it solves. I think the most appropriate next step is to record the findings in the penetration test report and let the client handle it.
upvoted 0 times
...

Save Cancel