exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 439 discussion

Actual exam question from CompTIA's SY0-601
Question #: 439
Topic #: 1
[All SY0-601 Questions]

Which of the following can be used to detect a hacker who is stealing company data over port 80?

  • A. Web application scan
  • B. Threat intelligence
  • C. Log aggregation
  • D. Packet capture
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
cyberPunk28
1 year, 6 months ago
Selected Answer: D
D. Packet capture
upvoted 1 times
...
sujon_london
1 year, 9 months ago
Selected Answer: D
Packet capture, also known as packet sniffing or network traffic analysis, can be used to detect a hacker who is stealing company data over port 80. By capturing and analyzing network packets, security teams can inspect the actual data being transmitted over the network, identify any unusual or unauthorized activities, and potentially uncover signs of data exfiltration or suspicious behavior.
upvoted 2 times
...
Jacks_Knight_
1 year, 9 months ago
Selected Answer: D
Port 80 is for HTTP which is not encrypted, so capturing the packets will allow you to view the contents for any relevant data
upvoted 3 times
...
ApplebeesWaiter1122
2 years, 1 month ago
Selected Answer: D
Packet capture is the best option for detecting a hacker who is stealing company data over port 80. Packet capture is the process of intercepting and logging network traffic. It allows security analysts to capture and analyze packets that are transmitted over a network. By analyzing the captured packets, security analysts can identify the source and destination of network traffic, as well as the contents of the packets. In this scenario, packet capture can be used to capture network traffic over port 80, which is commonly used for web traffic. By analyzing the captured packets, security analysts can identify any suspicious traffic that may indicate a hacker stealing company data.
upvoted 4 times
...
fouserd
2 years, 1 month ago
Selected Answer: D
To detect a hacker who is stealing company data over port 80, D. Packet capture can be used. Packet capture is a technique for intercepting and logging network traffic. By capturing and analyzing the packets sent over port 80, security analysts can identify any suspicious activity, such as the exfiltration of company data by a hacker. This information can then be used to investigate and mitigate the threat.
upvoted 3 times
...
mouettespaghetti
2 years, 2 months ago
-D is correct D. Packet capture can be used to detect a hacker who is stealing company data over port 80. Packet capture involves capturing and analyzing network traffic to identify malicious activity. By capturing packets sent and received over port 80, which is commonly used for HTTP traffic, it is possible to identify any suspicious activity that could indicate a hacker stealing company data.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...