Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-601 topic 1 question 323 discussion

Actual exam question from CompTIA's SY0-601
Question #: 323
Topic #: 1
[All SY0-601 Questions]

A retail store has a business requirement to deploy a kiosk computer in an open area. The kiosk computer’s operating system has been hardened and tested. A security engineer is concerned that someone could use removable media to install a rootkit. Which of the following should the security engineer configure to BEST protect the kiosk computer?

  • A. Measured boot
  • B. Boot attestation
  • C. UEFI
  • D. EDR
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
RvR109
Highly Voted 1 year, 2 months ago
Selected Answer: A
"Measured Boot is a new feature of Windows 8 that was created to help better protect your machine from rootkits and other malware. Measured Boot will check each start up component including the firmware all the way to the boot drivers and it will store this information in what is called a Trusted Platform Module (TPM)." https://www.microcenter.com/tech_center/article/8862/what-is-measured-boot
upvoted 28 times
...
skorza
Highly Voted 1 year, 2 months ago
Selected Answer: A
CHat GPT says EDR is typically used to detect and respond to threats after they have already bypassed other security measures. It is a reactive measure, rather than a preventative one. In this scenario, it would be better to prevent the rootkit from being installed in the first place, rather than relying on EDR to detect and respond to the threat after the fact. Measured boot, on the other hand, is a preventative measure that ensures the system starts with a known good state and can block the boot process or alert the security team if any changes are detected. Therefore, Measured boot is the BEST option for protecting the kiosk computer from the installation of a rootkit via removable media.
upvoted 15 times
BD69
1 month ago
ChatGPT is often wrong and lacks true understanding, so take it's suggestions with a grain of salt. In this case an EDR is useless for a bootable USB (which you can disable all bootable devices in the UEFI) and would only detect a rootkit delivery system, not a rootkits. Also you have to consider that EDR is mostly useless for zero-day attacks and consider that, even if the USB malware did install a rootkit from the OS, on the next boot, it would be immediately detected, if you configured boot attestation correctly.
upvoted 1 times
...
Zdane
1 year ago
It sounds ok, but ChatGPT often hallucinates info it provides, even making up the sources. I would not depend on it in search for "truth"
upvoted 8 times
user82
1 year ago
Yup, it just told me the answer is D. So there you go
upvoted 3 times
user82
1 year ago
I meant C
upvoted 1 times
...
...
...
...
shady23
Most Recent 1 day, 20 hours ago
Selected Answer: C
Unified Extensible Firmware Interface (UEFI) is a specification for a software program that connects a computer's firmware to its operating system (OS). UEFI is expected to eventually replace basic input/output system (BIOS) but is compatible with it.
upvoted 1 times
...
shady23
1 week, 4 days ago
Selected Answer: C
Unified Extensible Firmware Interface (UEFI) is a specification for a software program that connects a computer's firmware to its operating system (OS). UEFI is expected to eventually replace basic input/output system (BIOS) but is compatible with it.
upvoted 1 times
...
BD69
1 month ago
Selected Answer: B
Measured boot is typically for hardware and driver checking. I don't see it helping prevent a rootkit. Boot attestation, on the other hand, confirms the OS has not been tampered with. That said, B would be the most prudent choice, IMO. The problem with EDR is that it loads AFTER the OS and can't detect if a rootkit was installed or not (if a zero-day, you're screwed). If you configure your boot process, you can prevent a bootable USB from ever running in the first place. (you can disable all the USB ports as well, in UEFI, but then you can't use them and the kiosk may need it - depending on what the kiosk's function is)
upvoted 1 times
BD69
1 month ago
I'm going with A, actually. The reason is that Boot Attestation is something that Measured Boot is part of -> it reports boot measurements to the attestation service, which then verifies the state of the computer. The Boot Measurements include: Secure Boot (UEFI) and Trusted Boot (Verifies that the OS and system drivers are properly signed and trusted). As I said before EDR is useless in preventing bootable USB (rootkits generally need the system to re-boot after deposition to become truly active), especially for a zero-day attack
upvoted 1 times
...
...
LordJaraxxus
1 month, 3 weeks ago
Selected Answer: A
Many organizations implement boot integrity processes. These processes verify the integrity of the operating system and boot loading systems. For example, it can verify that key operating system files haven’t been changed. A measured boot goes through enough of the boot process to perform these checks without allowing a user to interact with the system. If it detects that the system has lost integrity and can no longer be trusted, the system won’t boot.
upvoted 1 times
...
david124
3 months, 3 weeks ago
Selected Answer: A
Measured Boot is intended to prevent boot-level malware. unlike secure boot, measured boot does't validate against a known good list of signatures before booting. instead it relies on the UEFI firmware to hash the firmware, bootloader, drivers, and anything else that is part of the boot process. then the data gathered is stored in the TPM. This boot attestation process allows comparison against known good states and admins can take action if the measured boot shows a difference from the accepted or secure known state.
upvoted 3 times
...
[Removed]
3 months, 3 weeks ago
Selected Answer: C
im thinking uefi
upvoted 1 times
...
AceVander
5 months ago
Since the question says, the OS has been "hardened and tested" I know that the OS has already been installed and Secure boot must be enabled before the installation of an OS. (Even though most computers these days have UEFI Secure boot enabled by default) A, B, and C are are processes or provided by UEFI Secure boot Even if I do not assume, UEFI secure boot is enabled by default, the question asks what should be "CONFIGURED?" UEFI secure boot is enabled (not configured) and the main concern is removable media installing rootkits. D. EDR (makes the most sense to configure endpoint detection for removable media on the kiosk)
upvoted 1 times
...
TONADO
6 months, 2 weeks ago
I go with answer A: According to CompTIA sec+ Study Guide, Secure Boot or Measured Boot is a feature of Unified Extensible Firmware Interface(UEFI) that ensures that code that ius executed during boot process has been authenticated b y a cryptographic signature. Secure Boot prevents malicious code from running at boot time, thus providing assurance that the system is executing only the code that is legitimate. This provides a measure of protection against rootkits and other malicious code that is designed to run at boot time.
upvoted 3 times
...
rasadebayor
6 months, 2 weeks ago
The best answer is A. Measured boot. Measured boot is a security feature that helps to protect systems from rootkits and other malware. It works by creating a cryptographic hash of all critical system components during the boot process. This hash is then stored in a trusted platform module (TPM). If any changes are detected to the critical system components, the boot process is halted and the user is alerted.
upvoted 2 times
...
guestionme
7 months, 3 weeks ago
I'm over this exam. A,B,& C could all be right. But it's their game and we must bow before them.
upvoted 4 times
...
above
7 months, 3 weeks ago
https://learn.microsoft.com/en-us/windows/security/operating-system-security/system-security/secure-the-windows-10-boot-process
upvoted 1 times
...
benni3c
8 months, 3 weeks ago
Very confusing, but I believe since it talks about configuring, the UEFI provides options to configure. The rest are described as processes. https://www.professormesser.com/security-plus/sy0-601/sy0-601-video/boot-integrity/
upvoted 5 times
...
DriftandLuna
9 months, 1 week ago
what a stupid question According to the official cert guide "The second security feature intended to help prevent boot-level malware is measured boot. These boot processes measure each component, starting with the firmware and ending with the boot start drivers. Measured boot does not validate against a known good list of signatures before booting; instead, it relies on the UEFI firmware to hash the firmware, bootloader, drivers, and anything else that is part of the boot process" That seems to suggest option A is a part of option C. But it doesn't end there, it goes on to say "The data gathered is stored in the Trusted Platform Module (TPM), and the logs can be validated remotely to let security administrators know the boot state of the system. This boot attestation process allows comparison against known good states, and administrators can take action if the measured boot shows a difference from the accepted or secure known state" So that then says measured boot is a uefi drive boot attestation process so take your pick from A, B or C!
upvoted 4 times
...
ganganman
10 months ago
absolutely genius question
upvoted 3 times
...
ApplebeesWaiter1122
10 months, 3 weeks ago
Selected Answer: C
UEFI provides advanced firmware-level security features, including Secure Boot, which ensures that only trusted and properly signed bootloaders and operating systems are allowed to execute during the boot process. By enabling Secure Boot in UEFI, the kiosk computer will only boot using signed and verified software, preventing the execution of malicious or unauthorized code, such as a rootkit, from removable media. Measured boot and boot attestation are related concepts but focus more on verifying the integrity of the boot process and ensuring the integrity of the entire system state. They may be beneficial in other scenarios but are not directly applicable to protecting against rootkit installation via removable media. EDR (Endpoint Detection and Response) is a security solution that monitors and responds to security events on endpoints, such as computers. While EDR can help detect and respond to potential threats, it is not specifically designed to prevent the installation of rootkits via removable media.
upvoted 11 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...