Thefifth stageof penetration testing is known aspost-exploitationoranalysis of the compromised environment. It involves:
Checking the compromised system/networkto determine the scope of access.
Identifying potential for further exploitation.
Gathering information about the environment.
Option Arelates to the risk assessment phase.
Option Bis typically done in post-exploitation but isn’t the main step.
Option D(collecting evidence) is more related to reporting/documentation at the end.
[Reference:Dell Information Storage and Management Foundations 2023 Study Guide, Section: Security Assessment – Penetration Testing Process., ]
Submit