Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-002 Topic 4 Question 76 Discussion

Actual exam question for CompTIA's PT0-002 exam
Question #: 76
Topic #: 4
[All PT0-002 Questions]

A penetration tester discovers a file, key.enc. on a shared drive and then executes the following command, which yields the following output:

Which of the following are the best recommendations for the penetration tester to suggest? (Select two).

Show Suggested Answer Hide Answer
Suggested Answer: B, D

Contribute your Thoughts:

Karon
2 months ago
Haha, the penetration tester must have been like, 'Bingo! This is gonna be a piece of cake.' But hey, kudos for at least trying to encrypt the file, even if it wasn't quite up to snuff. C and D all the way, my friends. Time to tighten up that security.
upvoted 0 times
Judy
11 days ago
Tiffiny: Tightening up security is the way to go.
upvoted 0 times
...
Alba
13 days ago
User 3: Agreed, and we should also delete unencrypted files from the share.
upvoted 0 times
...
Tiffiny
15 days ago
User 2: Definitely, we need stronger encryption for private key files.
upvoted 0 times
...
Vicki
18 days ago
User 1: Yeah, that key.enc file was a giveaway.
upvoted 0 times
...
...
Brande
2 months ago
Alright, alright, looks like we've got a real security nightmare on our hands. I'd say C and D are the way to go, but let's not forget about good old-fashioned password management too. Can't have folks leaving their private keys lying around, you know?
upvoted 0 times
...
Shanda
2 months ago
Haha, I bet the penetration tester was like, 'Jackpot!' when they found that file. But seriously, C and D are the best moves here - strengthen that encryption and clean up that shared drive. Can't be too careful with sensitive stuff like that.
upvoted 0 times
Dona
1 months ago
Agreed, encryption and file management are key in this situation.
upvoted 0 times
...
Giuseppe
2 months ago
User 2: Agreed, we definitely need to use stronger encryption and delete unencrypted files.
upvoted 0 times
...
Lucille
2 months ago
Definitely, C and D are crucial steps to take.
upvoted 0 times
...
Tequila
2 months ago
User 1: Yeah, finding key.enc was a lucky break.
upvoted 0 times
...
...
Maia
3 months ago
Yikes, that openssl command output is not looking too hot. I'd say C and D are definitely the way to go - gotta lock down those private key files and get rid of any unencrypted files. No need to get too fancy with DSA keys or key rotation just yet.
upvoted 0 times
Tonette
1 months ago
User1: Absolutely, let's focus on the basics before getting into more complex solutions like key rotation.
upvoted 0 times
...
Dulce
2 months ago
User2: Definitely, we need to prioritize securing those private key files and cleaning up any unencrypted files.
upvoted 0 times
...
Leatha
2 months ago
User1: Agreed, C and D seem like the most urgent steps to take.
upvoted 0 times
...
...
Jeanice
3 months ago
I think initiating key rotation could also be a good recommendation to prevent future security breaches.
upvoted 0 times
...
Tawna
3 months ago
I agree with Portia. Those two options would definitely help improve security.
upvoted 0 times
...
Portia
3 months ago
I think the best recommendations would be implementing password management and using stronger encryption for private key files.
upvoted 0 times
...
Ramonita
3 months ago
Whoa, looks like someone's been a little too lax with their file security! C'mon, 'key.enc' on a shared drive? That's asking for trouble.
upvoted 0 times
Gennie
2 months ago
User 3: They should also consider implementing password management to enhance security.
upvoted 0 times
...
Suzi
3 months ago
User 2: I agree, using stronger encryption for private key files is a must.
upvoted 0 times
...
Sueann
3 months ago
User 1: They definitely need to step up their file security game.
upvoted 0 times
...
...

Save Cancel