exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 644 discussion

Actual exam question from CompTIA's SY0-601
Question #: 644
Topic #: 1
[All SY0-601 Questions]

A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again. Which of the following should the IT administrator do FIRST after recovery?

  • A. Scan the NAS for residual or dormant malware and take new daily backups that are tested on a frequent basis.
  • B. Restrict administrative privileges and patch all systems and applications.
  • C. Rebuild all workstations and install new antivirus software.
  • D. Implement application whitelisting and perform user application hardening.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
sujon_london
Highly Voted 1 year, 10 months ago
Selected Answer: B
Initially thought it was D but after a little research agreed with B; here`s why: The IT administrator should restrict administrative privileges and patch all systems and applications to prevent future attacks. One of the common ways ransomware spreads and gains access to critical systems is through compromised administrative accounts. By restricting administrative privileges, the administrator can limit the ability of malware to spread and make unauthorized changes.
upvoted 22 times
JT4
1 year, 9 months ago
You are right, I equally thought "D" first, but the key word "FIRST" changed my mind.
upvoted 4 times
...
...
vitasaia
Highly Voted 1 year, 5 months ago
Selected Answer: A
It's A for two reasons. 1. they're asking what's the FIRST thing to do. Anyone would ensure the system is 100% clean from that malware. 2. Even though the other options are good protections, you cannot guarantee that you're 100% shielded. And if it happens again, you will pay again because you don't have backups.
upvoted 11 times
...
2d3d7b4
Most Recent 1 year ago
Selected Answer: A
shouldn't the area be first secured? then you start patching I am between A&B I feel A is more correct.
upvoted 1 times
...
scoobysnack209
1 year, 1 month ago
Quick google search: "90 per cent of ransomware strains do not require admin rights." The answer is A
upvoted 1 times
...
shady23
1 year, 1 month ago
Selected Answer: A
A. Scan the NAS for residual or dormant malware and take new daily backups that are tested on a frequent basis
upvoted 1 times
...
spearous
1 year, 2 months ago
Selected Answer: B
Vote for B. the reason that A is wrong, because A said NAS, no one knows they used NAS or not. Maybe they used RAID6,,,don't use more infor than given.
upvoted 4 times
...
Geronemo
1 year, 2 months ago
Selected Answer: B
After recovering from a ransomware attack triggered by a phishing email, the FIRST step the IT administrator should take is: B. Restrict administrative privileges and patch all systems and applications. Restricting administrative privileges helps mitigate the impact of future attacks by limiting the ability of malware to spread and execute malicious actions with elevated privileges. Patching all systems and applications ensures that known vulnerabilities are addressed, reducing the attack surface and strengthening the overall security posture of the IT environment. While options such as scanning for residual malware, taking new backups, rebuilding workstations, and implementing application whitelisting are important security measures, addressing administrative privileges and patching systems and applications are immediate priorities to prevent similar attacks from occurring again.
upvoted 2 times
...
russian
1 year, 2 months ago
Selected Answer: B
B makes more sense
upvoted 1 times
...
adam.regula91
1 year, 2 months ago
Selected Answer: A
the question is about "what FIRST" so answer A is the most appropriate
upvoted 1 times
...
mikzer
1 year, 2 months ago
Selected Answer: B
Always use recent backups to recover from a ransomware attack. A says to take new daily backups, WRONG. The problem was caused by an administrator account as a small business, not enterprise. By restricting administrative privileges, the organization can reduce the risk of unauthorized changes to systems and applications, which could potentially lead to malware infections.
upvoted 2 times
...
_deleteme_
1 year, 2 months ago
B - Question asks "ensure does not happen again", this means there was a vulnerability to begin with that allowed the ransomware. A is a good option after making sure it cant happen again or else it will keep happening. From Comptia "Other best practices for avoiding ransomware include regularly updating systems to take advantage of vulnerability patches" - from https://www.comptia.org/content/articles/what-is-ransomwar From Professer Messer - "If they find a backup, they will also encrypt the backup that you’ve created. This is also why we tell people to always maintain the security patches on your system so that all of those known vulnerabilities are not available to this ransomware" https://www.professormesser.com/security-plus/sy0-601/sy0-601-video/ransomware-and-crypto-malware-2/#google_vignette
upvoted 3 times
...
ps1hacker
1 year, 2 months ago
Selected Answer: B
It’s B. A is a good idea, but I think B takes priority. Also A mentions a NAS but it was never mentioned in the questions scenario so that makes me even more skeptical that it would be A.
upvoted 1 times
...
MF757
1 year, 3 months ago
Selected Answer: B
By restricting administrative privileges, the organization can reduce the risk of unauthorized changes to systems and applications, which could potentially lead to malware infections. Additionally, patching all systems and applications ensures that known vulnerabilities are addressed, making it more difficult for attackers to exploit weaknesses in the system.
upvoted 1 times
...
ID77
1 year, 4 months ago
Selected Answer: A
Best way to protect yourself from a Ransomware attack is having a good backup process.
upvoted 2 times
...
memodrums
1 year, 4 months ago
Selected Answer: B
Here's why I think its B, it saying what do first after recovery, A does not fall into things to do after recovery, A falls into eradication. B makes the most realistic sense with the information provided.
upvoted 2 times
...
johnabayot
1 year, 5 months ago
Selected Answer: B
Restrict administrative privileges and patch all systems and applications. This should be done after recovery to prevent further attacks.
upvoted 2 times
...
gr23
1 year, 5 months ago
D:. Containment and remediation are the first step and since the question says IT administrator account was used to spread virus, those rights have to be removed first or else the systems will re-encrypt themselves after you apply the key. Patching would also prevent re-infection. D: would be applied after the Lessons Learned, and since it's not the first step, it's not the right anwer
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...