Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-002 Topic 1 Question 44 Discussion

Actual exam question for CompTIA's PT0-002 exam
Question #: 44
Topic #: 1
[All PT0-002 Questions]

A penetration tester is conducting an assessment for an e-commerce company and successfully copies the user database to the local machine. After a closer review, the penetration tester identifies several high-profile celebrities who have active user accounts with the online service. Which of the following is the most appropriate next step?

Show Suggested Answer Hide Answer
Suggested Answer: C

The most likely explanation for why a penetration tester cannot scan a server that was previously scanned successfully is that the IP address is on the blocklist. Blocklists are used to prevent malicious actors from scanning servers, and if the IP address of the server is on the blocklist, the scanning process will be blocked.


Contribute your Thoughts:

Levi
1 months ago
Whoa, we've got some A-list celebs in the user database! Wonder if we can get some free swag out of this. Just kidding, of course. Gotta keep it professional and let the client know the deets. Might as well ask for a raise while you're at it, though!
upvoted 0 times
Eladia
6 days ago
B: Definitely, we need to inform the client right away.
upvoted 0 times
...
Bulah
11 days ago
A: Record the findings in the penetration test report.
upvoted 0 times
...
...
Mireya
2 months ago
Okay, so we've got a bunch of famous folks with accounts on this e-commerce site. Sounds like a juicy opportunity to make some headlines, but I guess that's not the professional thing to do. Better just stick to the report and let the client handle it.
upvoted 0 times
Youlanda
6 days ago
C: Contacting the high-profile celebrities would be a breach of ethics.
upvoted 0 times
...
Jeannetta
7 days ago
B: Yeah, we should let the client know right away.
upvoted 0 times
...
Teresita
11 days ago
A: Definitely record the findings in the penetration test report.
upvoted 0 times
...
...
Felice
2 months ago
Definitely need to contact the client ASAP on this one. Those celebrity accounts could be a goldmine for malicious actors. Can't just sit on that information, gotta nip it in the bud before it becomes a bigger problem.
upvoted 0 times
Cletus
1 months ago
Agreed, contacting the client is the best course of action.
upvoted 0 times
...
...
Tiera
2 months ago
But shouldn't we also delete the high-profile accounts to protect their privacy?
upvoted 0 times
...
Lonny
2 months ago
I agree with Shaun, it's important to inform the client.
upvoted 0 times
...
Shaun
2 months ago
We should immediately contact the client.
upvoted 0 times
...
Richelle
2 months ago
Whoa, that's a lot of high-profile accounts! I'd be tempted to just delete them and call it a day, but that's probably not the best approach. Better to play by the rules and report it to the client. They can decide how to handle it.
upvoted 0 times
Raymon
1 months ago
B: I agree, it's important to follow proper procedures and report the findings to the client.
upvoted 0 times
...
Paola
1 months ago
A: Definitely don't delete the accounts, that could cause more harm than good.
upvoted 0 times
...
Wayne
1 months ago
C) Immediately contact the client.
upvoted 0 times
...
Portia
1 months ago
D) Record the findings in the penetration test report.
upvoted 0 times
...
Osvaldo
2 months ago
A) Contact the high-profile celebrities.
upvoted 0 times
...
...
Javier
2 months ago
Hmm, this is a tricky one. Contacting the celebrities directly could be seen as a violation of their privacy. Deleting the accounts may raise more issues than it solves. I think the most appropriate next step is to record the findings in the penetration test report and let the client handle it.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77