exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 446 discussion

Actual exam question from CompTIA's SY0-601
Question #: 446
Topic #: 1
[All SY0-601 Questions]

A user reset the password for a laptop but has been unable to log in to it since then. In addition, several unauthorized emails were sent on the user’s behalf recently. The security team investigates the issue and identifies the following findings:

• Firewall logs show excessive traffic from the laptop to an external site.
• Unknown processes were running on the laptop.
• RDP connections that appeared to be authorized were made to other network devices from the laptop.
• High bandwidth utilization alerts from that user's username.

Which of the following is most likely installed on the laptop?

  • A. Worm
  • B. Keylogger
  • C. Trojan
  • D. Logic bomb
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ApplebeesWaiter1122
Highly Voted 2 years, 1 month ago
Selected Answer: C
CHANGING MY ANSWER TO C A Trojan is a type of malware that disguises itself as legitimate software to gain access to a system and carry out malicious activities. The firewall logs show excessive traffic from the laptop to an external site, indicating that the laptop is communicating with a remote server or command and control center. The presence of unknown processes and unauthorized RDP connections also suggest that the laptop has been compromised and is being controlled by an attacker. A keylogger is a type of malware that records keystrokes, while a worm is a self-replicating malware that spreads through a network. A logic bomb is a type of malware that is triggered by a specific event or condition. While these types of malware may also be present on the laptop, they are less likely to explain the symptoms described in the scenario. My Pen Tester friend also agrees it is C
upvoted 15 times
...
toffer96
Most Recent 1 year, 1 month ago
Selected Answer: D
They really could provide a little more context. I am thinking Logic Bomb here, as it's triggered by an event (in this case, a user resetting their password) which certainly could result in the listed characteristics.
upvoted 1 times
...
ak4512w2
1 year, 2 months ago
Selected Answer: D
why cant it be logic bomb? it says SINCE he changed the password?
upvoted 1 times
...
ZiareKing
1 year, 3 months ago
Selected Answer: C
It took some digging. (c) It's trojan....I was originally convinced that this was a keylogger attack.
upvoted 3 times
...
6de42b3
1 year, 4 months ago
I think people are overanalyzing over this. There's no mention of the user downloading anything so the Trojan option is unlike. I'll go with B key logger.
upvoted 3 times
...
memodrums
1 year, 4 months ago
Selected Answer: B
Switching my answer to B here's why. The question does not state if the user downloaded anything to be a Trojan, they simply changed their password. Keylogger makes most sense since the keystrokes was possible sent to a remote attacker and that attacker began to perform all the functions that were displayed on the logs.
upvoted 4 times
...
johnabayot
1 year, 4 months ago
Selected Answer: C
Trojan it is
upvoted 2 times
...
klinkklonk
1 year, 5 months ago
Selected Answer: B
KEYLOGGER This is how it all began, not by downloading anything.
upvoted 2 times
...
brf2017
1 year, 5 months ago
C. Because a Trojan could include a Keylogger. A keylogger is usually installed by some type of malware (links, attachment)
upvoted 2 times
...
ganymede
1 year, 6 months ago
Selected Answer: B
B. Keylogger The key logger captured the user's reset credentials. Then the attacker reset the credentials to something else locking out the user. Then got access to the user's email account and also made RDP connections using the new credentials.
upvoted 2 times
...
BigBadWolff
1 year, 6 months ago
Here is what Chat GPT says C. Trojan Here's the reasoning for this choice based on the identified findings: Excessive Traffic to External Site: Trojans are known for establishing unauthorized connections to external servers or sites, often to communicate with a command and control server controlled by attackers. Unknown Processes: Trojans often run as malicious processes in the background, and their presence may be concealed by using random or inconspicuous process names. Unauthorized RDP Connections: Trojans can provide attackers with remote access to compromised systems. Unauthorized RDP connections suggest that an attacker may be controlling the laptop remotely. High Bandwidth Utilization: Trojans may perform various malicious activities, including data exfiltration or participating in distributed denial-of-service (DDoS) attacks, leading to high bandwidth utilization. Given the combination of these indicators, a Trojan is the most likely culprit in this scenario.
upvoted 1 times
...
DChilds
1 year, 8 months ago
Selected Answer: B
The first statement provides the first clue, "A user reset the password for a laptop but has been unable to log in to it since then". Everything after this is a consequence of the account password being changed thereby locking the user out. To add to the argument, "RDP connections that appeared to be authorized were made to other network devices from the laptop." This would not happen if the attacker did not have full access to the corporate account. From the options provided, a keylogger is the best tool for the attacker to deny the user access to their corporate account again.
upvoted 4 times
...
AzureG0d
1 year, 8 months ago
Selected Answer: B
I'm going to go against the grain here, like examstudy1 said. None of this happened until the user reset their password. As dicey as this questions is, it has to be a Keylogger.
upvoted 3 times
...
fercho2023
1 year, 8 months ago
I choose A since there is a high utilization of user's bandwidth .
upvoted 2 times
...
examstudy1
1 year, 9 months ago
Selected Answer: B
Surely this is a keylogger - The user resets their password and then all of this starts happening. Keylogger recorded the users password, with the password, used to send out emails and then rdp to other devices etc.
upvoted 3 times
...
je123
1 year, 10 months ago
Selected Answer: A
Not Trojan in my opinion since the question did not highlight anything about user downloading legitimate software/application. Trojan's signature is as the name implies.. It appears to be a legitimate software/application but it not, as it contain malicious components. Following Worms fits the description in the question: 1) Once Morto infects one computer on a network, the worm scans for other devices that have Remote Desktop Protocol enabled and copies itself to these computer's local drives as a DLL file, which then created additional files on the computers. 2) Email-Worms spread via email. The worm sends a copy of itself as an attachment to an email message or a link to its file on a network resource
upvoted 2 times
...
ApplebeesWaiter1122
2 years, 1 month ago
Selected Answer: A
A- just because of this statement here: "RDP connections that appeared to be authorized were made to other network devices from the laptop." Worm- A computer program that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively
upvoted 2 times
ApplebeesWaiter1122
2 years, 1 month ago
After thinking about it I am changing my Answer to RAT or C
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...