exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 452 discussion

Actual exam question from CompTIA's SY0-601
Question #: 452
Topic #: 1
[All SY0-601 Questions]

A security investigation revealed that malicious software was installed on a server using a server administrator's credentials. During the investigation, the server administrator explained that Telnet was regularly used to log in. Which of the following most likely occurred?

  • A. A spraying attack was used to determine which credentials to use
  • B. A packet capture tool was used to steal the password
  • C. A remote-access Trojan was used to install the malware
  • D. A dictionary attack was used to log in as the server administrator
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
fouserd
Highly Voted 2 years, 1 month ago
Selected Answer: B
In this scenario, it is most likely that B. A packet capture tool was used to steal the password. Telnet is an unencrypted protocol that sends data, including login credentials, in clear text over the network. This means that anyone with access to the network traffic can use a packet capture tool to intercept and read the login credentials. In this case, an attacker could have used a packet capture tool to steal the server administrator’s password and then used it to log in and install the malicious software on the server.
upvoted 8 times
...
ApplebeesWaiter1122
Highly Voted 2 years, 1 month ago
Selected Answer: B
Telnet sends login credentials in plain text format, which makes them vulnerable to interception and unauthorized access. Attackers can use packet capture tools to capture network traffic and steal login credentials. In this case, it is likely that an attacker used a packet capture tool to capture the server administrator's Telnet login credentials and then used them to install the malicious software.
upvoted 5 times
...
amilcar73
Most Recent 1 year, 4 months ago
Option B is correct
upvoted 1 times
...
fercho2023
1 year, 8 months ago
Option B. Telnet doesn't encrypt the traffic.
upvoted 2 times
...
above
1 year, 9 months ago
Selected Answer: B
Key point is "using the server administrator's credentials". Credentials were stolen. Telnet sessions between the client and the server are not encrypted without a workaround. So those with access to the TCP/IP packet flow between hosts can observe all of the traffic, listen in, and record potentially sensitive information like logins and passwords of users connecting to the Telnet server.
upvoted 2 times
...
sujon_london
1 year, 9 months ago
Selected Answer: C
While it’s possible that a packet capture tool could capture login credentials, including passwords, during Telnet sessions, the scenario described in the question focuses on the installation of malicious software using the server administrator’s credentials. The use of Telnet by itself doesn’t necessarily imply that a packet capture tool was used to steal the password, as Telnet is an inherently insecure protocol that transmits data, including login credentials, in plaintext. In this case, it’s more likely that the malicious software was installed after the attacker gained unauthorized access to the server, possibly using the server administrator’s credentials, and not specifically through the interception of Telnet login credentials. Therefore, while packet capture tools can capture login credentials, the question’s emphasis appears to be on the installation of malware after unauthorized access was gained, making option C (a remote-access Trojan) a more suitable choice for the described scenario.
upvoted 1 times
...
ronah
2 years ago
Selected Answer: C
In this case, the server administrator mentioned that Telnet was regularly used to log in. Telnet is an unencrypted remote access protocol that sends login credentials in plain text over the network. This makes it susceptible to interception and unauthorized access. A remote-access Trojan (RAT) is a type of malware that allows an attacker to gain unauthorized access to a system. It can be used to control the compromised server remotely, install additional malware, steal sensitive information, or carry out malicious activities. If the server administrator used Telnet regularly and the malware was installed using their credentials, it suggests that a remote-access Trojan might have been employed to gain unauthorized access and install the malware on the server. The other options listed are less likely given the information provided:
upvoted 1 times
ronah
2 years ago
A. A spraying attack involves trying a small number of common credentials against multiple accounts. It is less likely in this case since the attack succeeded using the server administrator's credentials. B. A packet capture tool captures network traffic, including passwords, by sniffing network packets. While this could be a possibility, it is less likely than the use of a remote-access Trojan as the cause of the compromise. D. A dictionary attack involves attempting to guess passwords by systematically trying common words or combinations from a dictionary. It is less likely in this scenario as the server administrator's credentials were used, indicating that the attacker already had the correct login information. Therefore, based on the provided information, the most likely scenario is that a remote-access Trojan (RAT) was used to install the malware on the server after intercepting the server administrator's Telnet credentials.
upvoted 1 times
...
...
mouettespaghetti
2 years, 1 month ago
-B is correct The use of Telnet by the server administrator suggests that the credentials were transmitted in cleartext, which means that they could have been intercepted by an attacker who was monitoring the network traffic. Therefore, the most likely scenario is that: B. A packet capture tool was used to steal the password
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...