Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-003 Topic 4 Question 19 Discussion

Actual exam question for CompTIA's PT0-003 exam
Question #: 19
Topic #: 4
[All PT0-003 Questions]

Which of the following activities should be performed to prevent uploaded web shells from being exploited by others?

Show Suggested Answer Hide Answer
Suggested Answer: D

Secure Data Destruction:

Securely deleting the web shell ensures it cannot be accessed or exploited by attackers in the future.

This involves removing the malicious file and overwriting the space it occupied to prevent recovery.

Why Not Other Options?

A (Remove persistence mechanisms): While helpful in maintaining security, this doesn't address the immediate threat of the web shell.

B (Spin down infrastructure): This could disrupt operations and doesn't directly mitigate the web shell issue.

C (Preserve artifacts): While necessary for forensic analysis, it does not prevent further exploitation of the web shell.

CompTIA Pentest+ Reference:

Domain 3.0 (Attacks and Exploits)


Contribute your Thoughts:

Cordelia
2 months ago
Secure data destruction? Sounds like a job for the 'Men in Black'! But I'll stick with option A, just to be on the safe side.
upvoted 0 times
Isaiah
1 months ago
User 2: I think I'll go with option A, removing the persistence mechanisms.
upvoted 0 times
...
Velda
1 months ago
User 1: Secure data destruction? Sounds intense!
upvoted 0 times
...
...
Stevie
2 months ago
But what about preserving artifacts? Wouldn't that also help prevent exploitation?
upvoted 0 times
...
Odelia
2 months ago
Preserve artifacts? What are we, archaeologists? I think option A is the way to go, unless you want those web shells to keep causing trouble.
upvoted 0 times
Jannette
1 months ago
Option A sounds like the best choice to prevent those web shells from causing trouble.
upvoted 0 times
...
Willis
1 months ago
Option A) Remove the persistence mechanisms.
upvoted 0 times
...
...
Belen
2 months ago
I agree with Stefania, removing the persistence mechanisms would prevent exploitation.
upvoted 0 times
...
Gilbert
2 months ago
Spin down the infrastructure? What is this, a game of Tetris? I'm going with option A, for sure.
upvoted 0 times
Marti
1 months ago
That's also a valid option. It's crucial to ensure no sensitive data is left behind.
upvoted 0 times
...
Thurman
1 months ago
Option D) Perform secure data destruction.
upvoted 0 times
...
Johnathon
1 months ago
That's a good choice. It's important to prevent web shells from being exploited.
upvoted 0 times
...
Rasheeda
2 months ago
Option A) Remove the persistence mechanisms.
upvoted 0 times
...
...
Shawn
2 months ago
Removing the persistence mechanisms seems like the obvious choice here. Can't have those web shells hanging around, can we?
upvoted 0 times
Adrianna
2 months ago
B) Spin down the infrastructure
upvoted 0 times
...
Alonzo
2 months ago
A) Remove the persistence mechanisms
upvoted 0 times
...
...
Stefania
2 months ago
I think the answer is A) Remove the persistence mechanisms.
upvoted 0 times
...

Save Cancel