Certified Ethical Hacker – CEH – 312-50 – Question251

Under the "Post-attack Phase and Activities", it is the responsibility of the tester to restore the systems to a pre-test state.

Which of the following activities should not be included in this phase? (see exhibit)

Exhibit:


A.
III
B. IV
C. III and IV
D. All should be included.

Correct Answer: A

Explanation:

The post-attack phase revolves around returning any modified system(s) to the pretest state. Examples of such activities:
Removal of any files, tools, exploits, or other test-created objects uploaded to the system during testing

Removal or reversal of any changes to the registry made during system testing
References: Computer and Information Security Handbook, John R. Vacca (2012), page 531