Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-601 topic 1 question 644 discussion

Actual exam question from CompTIA's SY0-601
Question #: 644
Topic #: 1
[All SY0-601 Questions]

A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again. Which of the following should the IT administrator do FIRST after recovery?

  • A. Scan the NAS for residual or dormant malware and take new daily backups that are tested on a frequent basis.
  • B. Restrict administrative privileges and patch all systems and applications.
  • C. Rebuild all workstations and install new antivirus software.
  • D. Implement application whitelisting and perform user application hardening.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
sujon_london
Highly Voted 8 months, 2 weeks ago
Selected Answer: B
Initially thought it was D but after a little research agreed with B; here`s why: The IT administrator should restrict administrative privileges and patch all systems and applications to prevent future attacks. One of the common ways ransomware spreads and gains access to critical systems is through compromised administrative accounts. By restricting administrative privileges, the administrator can limit the ability of malware to spread and make unauthorized changes.
upvoted 16 times
JT4
7 months, 4 weeks ago
You are right, I equally thought "D" first, but the key word "FIRST" changed my mind.
upvoted 4 times
...
...
vitasaia
Highly Voted 3 months, 1 week ago
Selected Answer: A
It's A for two reasons. 1. they're asking what's the FIRST thing to do. Anyone would ensure the system is 100% clean from that malware. 2. Even though the other options are good protections, you cannot guarantee that you're 100% shielded. And if it happens again, you will pay again because you don't have backups.
upvoted 7 times
...
scoobysnack209
Most Recent 3 days, 1 hour ago
Quick google search: "90 per cent of ransomware strains do not require admin rights." The answer is A
upvoted 1 times
...
shady23
1 week, 1 day ago
Selected Answer: A
A. Scan the NAS for residual or dormant malware and take new daily backups that are tested on a frequent basis
upvoted 1 times
...
spearous
1 week, 5 days ago
Selected Answer: B
Vote for B. the reason that A is wrong, because A said NAS, no one knows they used NAS or not. Maybe they used RAID6,,,don't use more infor than given.
upvoted 1 times
...
Geronemo
3 weeks, 1 day ago
Selected Answer: B
After recovering from a ransomware attack triggered by a phishing email, the FIRST step the IT administrator should take is: B. Restrict administrative privileges and patch all systems and applications. Restricting administrative privileges helps mitigate the impact of future attacks by limiting the ability of malware to spread and execute malicious actions with elevated privileges. Patching all systems and applications ensures that known vulnerabilities are addressed, reducing the attack surface and strengthening the overall security posture of the IT environment. While options such as scanning for residual malware, taking new backups, rebuilding workstations, and implementing application whitelisting are important security measures, addressing administrative privileges and patching systems and applications are immediate priorities to prevent similar attacks from occurring again.
upvoted 1 times
...
russian
3 weeks, 5 days ago
Selected Answer: B
B makes more sense
upvoted 1 times
...
adam.regula91
3 weeks, 6 days ago
Selected Answer: A
the question is about "what FIRST" so answer A is the most appropriate
upvoted 1 times
...
mikzer
1 month ago
Selected Answer: B
Always use recent backups to recover from a ransomware attack. A says to take new daily backups, WRONG. The problem was caused by an administrator account as a small business, not enterprise. By restricting administrative privileges, the organization can reduce the risk of unauthorized changes to systems and applications, which could potentially lead to malware infections.
upvoted 2 times
...
_deleteme_
1 month, 1 week ago
B - Question asks "ensure does not happen again", this means there was a vulnerability to begin with that allowed the ransomware. A is a good option after making sure it cant happen again or else it will keep happening. From Comptia "Other best practices for avoiding ransomware include regularly updating systems to take advantage of vulnerability patches" - from https://www.comptia.org/content/articles/what-is-ransomwar From Professer Messer - "If they find a backup, they will also encrypt the backup that you’ve created. This is also why we tell people to always maintain the security patches on your system so that all of those known vulnerabilities are not available to this ransomware" https://www.professormesser.com/security-plus/sy0-601/sy0-601-video/ransomware-and-crypto-malware-2/#google_vignette
upvoted 3 times
...
ps1hacker
1 month, 1 week ago
Selected Answer: B
It’s B. A is a good idea, but I think B takes priority. Also A mentions a NAS but it was never mentioned in the questions scenario so that makes me even more skeptical that it would be A.
upvoted 1 times
...
MF757
1 month, 1 week ago
Selected Answer: B
By restricting administrative privileges, the organization can reduce the risk of unauthorized changes to systems and applications, which could potentially lead to malware infections. Additionally, patching all systems and applications ensures that known vulnerabilities are addressed, making it more difficult for attackers to exploit weaknesses in the system.
upvoted 1 times
...
ID77
2 months, 2 weeks ago
Selected Answer: A
Best way to protect yourself from a Ransomware attack is having a good backup process.
upvoted 2 times
...
memodrums
2 months, 4 weeks ago
Selected Answer: B
Here's why I think its B, it saying what do first after recovery, A does not fall into things to do after recovery, A falls into eradication. B makes the most realistic sense with the information provided.
upvoted 2 times
...
johnabayot
3 months, 2 weeks ago
Selected Answer: B
Restrict administrative privileges and patch all systems and applications. This should be done after recovery to prevent further attacks.
upvoted 2 times
...
gr23
3 months, 2 weeks ago
D:. Containment and remediation are the first step and since the question says IT administrator account was used to spread virus, those rights have to be removed first or else the systems will re-encrypt themselves after you apply the key. Patching would also prevent re-infection. D: would be applied after the Lessons Learned, and since it's not the first step, it's not the right anwer
upvoted 1 times
...
Payu1994
3 months, 2 weeks ago
The IT administrator should first do B. Restrict administrative privileges and patch all systems and applications. This is because the ransomware attack could have exploited vulnerabilities in the systems or applications, and patching these would help prevent similar attacks in the future. Restricting administrative privileges would also limit the potential damage if another attack were to occur. While all the options are important steps in securing the network after a ransomware attack, patching systems and restricting administrative privileges is a critical first step to prevent further exploits. The other steps can then follow to ensure a comprehensive security strategy.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...