exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 487 discussion

Actual exam question from CompTIA's SY0-601
Question #: 487
Topic #: 1
[All SY0-601 Questions]

A digital forensics team at a large company is investigat ng a case in which malicious code was down oaded over an HTTPS connection and was running in memory, but was never committed to disk. Which of the following techniques should the team use to obtain a sample of the malware binary?

  • A. pcap reassembly
  • B. SSD snapshot
  • C. Image volatile memory
  • D. Extract from checksums
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Farticus
Highly Voted 2 years, 1 month ago
I passed as well.... these questions do help tremendously. Study them. Know why the right answers are the right ones and why the wrong answers are wrong and you'll do well. My test was about 50% new questions and 50% from here. ALL of the questions where the discussion group had split views of what the correct answer was were on my test. So were all of the simulation questions and a couple new ones. I had 6 simulation questions with 76 questions in total. I also recommend memorizing everything on the SYO-601 exam objectives document that CompTIA puts out. Good luck to each of you!
upvoted 22 times
[Removed]
2 years ago
Thank you. The objective on comptia are just few
upvoted 1 times
...
rodekill
2 years ago
Just passed as well, this place really helps i actually had 50-60% questions from here, and knew 2 out of 3 of the PBQ's I had. make sure you guy's follow Farticus's advice.
upvoted 11 times
...
...
Jim_83
Highly Voted 2 years, 1 month ago
So I passed my exam today! These questions are brilliant for helping with your study, however.... don't rely on them being in the exam. They do pop up on the exam, but the majority (70%) were questions I'd not seen before. So happy I paid for the whole question set on here though. Examtopics is the perfect place to aid your study plan 👌🏼
upvoted 8 times
...
cyberPunk28
Most Recent 1 year, 6 months ago
Selected Answer: C
C. Image volatile memory
upvoted 1 times
...
HiyaGeorgie
2 years ago
I take the exam in 2 hours. LETS DO THIS
upvoted 6 times
ComPCertOn
1 year, 8 months ago
you didn't come back! guessing you passed )
upvoted 7 times
...
...
ApplebeesWaiter1122
2 years, 1 month ago
Selected Answer: C
The digital forensics team needs to extract the malware binary from memory as it was never written to disk, so the option C "Image volatile memory" would be the best choice. By creating a memory dump, the team can analyze the memory content, including the malicious code, and extract the malware binary for further analysis and investigation. The other options, such as pcap reassembly, SSD snapshot, and extract from checksums, would not be effective in this scenario as they do not address the issue of extracting the malware binary from memory.
upvoted 7 times
...
fouserd
2 years, 1 month ago
Selected Answer: C
If malicious code was downloaded over an HTTPS connection and was running in memory but was never committed to disk, the digital forensics team should use the technique of C. Imaging volatile memory to obtain a sample of the malware binary. Imaging volatile memory involves capturing a snapshot of the system’s RAM, which can contain evidence of running processes and data that has not been saved to disk. By analyzing the memory image, the team can extract a sample of the malware binary for further analysis.
upvoted 4 times
...
if10w
2 years, 2 months ago
The digital forensics team should use the technique of "Image volatile memory" to obtain a sample of the malware binary. This technique involves creating a memory dump of the system's RAM, which can then be analyzed to extract the malware binary.
upvoted 2 times
...
mouettespaghetti
2 years, 2 months ago
-C is correct In this scenario, the malicious code was downloaded over an HTTPS connection and was running in memory but was never saved to disk. Therefore, the digital forensics team should use a technique to obtain a sample of the malware binary from volatile memory. The process of capturing an image of volatile memory is known as memory forensics, and it involves creating a snapshot of the system's volatile memory to analyze the data held in RAM. By analyzing the data stored in memory, the digital forensics team can locate the malicious code and obtain a sample of the malware binary. Option A, pcap reassembly, involves reassembling network traffic captured in a pcap file. Option B, SSD snapshot, is not relevant in this scenario since the malware was never committed to disk. Option D, extract from checksums, is not a valid technique for obtaining a sample of a malware binary.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...