exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 535 discussion

Actual exam question from CompTIA's SY0-601
Question #: 535
Topic #: 1
[All SY0-601 Questions]

A large financial services firm recently released information regarding a security breach within its corporate network that began several years before. During the time frame in which the breach occurred, indicators show an attacker gained administrative access to the network through a file downloaded from a social media site and subsequently installed it without the user's knowledge. Since the compromise, the attacker was able to take command and control of the computer systems anonymously while obtaining sensitive corporate and personal employee information. Which of the following methods did the attacker most likely use to gain access?

  • A. A bot
  • B. A fileless virus
  • C. A logic bomb
  • D. A RAT
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ApplebeesWaiter1122
Highly Voted 1 year, 11 months ago
Selected Answer: D
Given the scenario described, the most likely method the attacker used to gain access to the network is a Remote Access Trojan (RAT). A RAT is a type of malware that provides an attacker with unauthorized remote access to a victim's computer system. RATs can be delivered in various ways, including through email attachments, malicious downloads, or social engineering techniques. In this case, the attacker likely used a RAT that was delivered through the file downloaded from the social media site. Once the RAT was executed on the victim's system, it provided the attacker with administrative access, enabling them to take command and control of the computer systems and collect sensitive information.
upvoted 5 times
...
1403ad2
Most Recent 1 year, 4 months ago
I think rat
upvoted 1 times
...
Susan4041
1 year, 5 months ago
Selected Answer: D
Most likely a RAT
upvoted 1 times
...
Gamsje
1 year, 11 months ago
In fact, an attacker can use RAT to generate a Trojan horse to infect many computers and then build a botnet. Each infected computer is a bot. A and D are possible.
upvoted 3 times
...
mtnews
1 year, 11 months ago
Selected Answer: D
A RAT (remote access Trojan) is malware an attacker uses to gain full administrative privileges and remote control of a target computer.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...