exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 515 discussion

Actual exam question from CompTIA's SY0-601
Question #: 515
Topic #: 1
[All SY0-601 Questions]

A company's help desk received several AV alerts indicating Mimikatz attempted to run on the remote systems. Several users also reported that the new company flash drives they picked up in the break room only have 512KB of storage. Which of the following is most likely the cause?

  • A. The GPO prevents the use of flash drives, which triggers a false positive AV indication and restricts the drives to only 512KB of storage.
  • B. The new flash drives need a driver that is being blocked by the AV software because the flash drives are not on the application's allow list, temporarily restricting the drives to 512KB of storage.
  • C. The new flash drives are incorrectly partitioned, and the systems are automatically trying to use an unapproved application to repartition the drives.
  • D. The GPO blocking the flash drives is being bypassed by a malicious flash drive that is attempting to harvest plaintext credentials from memory.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
rline63
Highly Voted 1 year, 9 months ago
Maybe a good solution for this is just not keeping a bowl of flash drives for public use in the company breakroom.
upvoted 22 times
...
ApplebeesWaiter1122
Highly Voted 1 year, 11 months ago
Selected Answer: D
The GPO blocking the flash drives is being bypassed by a malicious flash drive that is attempting to harvest plaintext credentials from memory. The presence of Mimikatz alerts and reports of new company flash drives having only 512KB of storage indicate a potential security incident involving malicious activity. Mimikatz is a well-known tool used for extracting plaintext passwords and other sensitive information from memory, which could indicate an attempt to compromise the security of the systems. Additionally, the fact that the new flash drives have been tampered with and do not have their original storage capacity suggests that a malicious actor is using the flash drives to bypass the Group Policy Object (GPO) settings that block the use of flash drives. This could be an attempt to introduce malware or exfiltrate data using unauthorized hardware.
upvoted 8 times
Dapsie
1 year ago
Also, could that policy be looking for devices with 512gb storage?
upvoted 1 times
...
...
ComPCertOn
Most Recent 1 year, 7 months ago
Selected Answer: D
isn't it keylogger impl. method?
upvoted 1 times
...
Gamsje
1 year, 11 months ago
Selected Answer: D
Mimikatz is an open-source application that allows users to view and save authentication credentials such as Kerberos tickets. D
upvoted 5 times
...
LeonardSnart
1 year, 11 months ago
Selected Answer: D
Mimikatz A tool used by many penetration testers, attackers, and even malware that can be useful for retrieving password hashes from memory; it is a useful post-exploitation tool." -Security+ SY0-601 Pearson IT Cert Guide by Santos, Taylor, & Mlodzianowski
upvoted 2 times
...
blockface
1 year, 11 months ago
Selected Answer: D
I believe D is the answer Mimikatz is a tool that is commonly used by hackers and security professionals to extract sensitive information, such as passwords and credentials, from a system's memory. The flash drive most likely has a malicious code that is trying to execute Mimikatz do dump credentials from memory.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...