exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 824 discussion

Actual exam question from CompTIA's SY0-601
Question #: 824
Topic #: 1
[All SY0-601 Questions]

A security administrator recently reset local passwords and the following values were recorded in the system:



Which of the following is the security administrator most likely protecting against?

  • A. Account sharing
  • B. Weak password complexity
  • C. Pass-the-hash attacks
  • D. Password compromise
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
johnabayot
Highly Voted 1 year, 3 months ago
Selected Answer: C
C. Pass the hash attack By resetting the local passwords, the security administrator is changing the hash values of the passwords, which invalidates any previously stolen hashes. This prevents the attacker from using the old hashes to access the system or move laterally across the network. Resetting the local passwords does not protect against password compromise, unless the administrator also ensures that the passwords are stored securely, transmitted over encrypted channels, and protected from phishing or keylogging attacks.
upvoted 9 times
...
SM9
Most Recent 9 months, 3 weeks ago
Selected Answer: D
The table is a distractor. Just read the question without the table. Only D makes sense based on what is being asked. The attacker can still take the values from a newly generated table to perform the pass-the-hash attack.
upvoted 1 times
...
Dapsie
10 months, 3 weeks ago
Selected Answer: D
The password change action and storing the password hashes are protecting against password compromise
upvoted 1 times
...
Lipton376
1 year, 1 month ago
Selected Answer: C
C. Pass the hash
upvoted 1 times
...
Caballer
1 year, 2 months ago
Selected Answer: C
The values provided in the scenario look like hashed representations of passwords. When a security administrator resets local passwords and stores them in a hashed format, it is likely done to protect against pass-the-hash attacks.
upvoted 1 times
...
francuza
1 year, 2 months ago
its is local users hashes not passed anywhere
upvoted 1 times
...
subaie503
1 year, 2 months ago
Selected Answer: D
only answer that makes sense
upvoted 2 times
...
DrakeMallard
1 year, 2 months ago
Selected Answer: C
C. Pass-the-hash attacks Pass-the-hash attacks involve an attacker obtaining hashed passwords from a compromised system and then using those hashes to authenticate to other systems on the network. The use of MD5 hashed passwords (as seen in the provided values) can be vulnerable to pass-the-hash attacks because once the hash is obtained, it can potentially be used to authenticate without needing to crack the password itself. By resetting the local passwords and recording new hashed values, the security administrator is likely aiming to mitigate the risk of pass-the-hash attacks by ensuring that even if an attacker obtains hashed passwords, they will be unable to use them for unauthorized access.
upvoted 3 times
...
7308365
1 year, 3 months ago
D. Password compromise I think they are just resetting the passwords based on time. All of the accounts are admin accounts so I'm assuming they have admins reset their accounts more frequently than other users. In this situation, the fact that the passwords are hashed doesn't matter because there are programs to crack the hash and changing the hash more frequently doesn't make it any easier/harder for the software to crack said hash... Lack of access to the actual hashes makes pass-the-hash attacks harder.
upvoted 4 times
...
Benrosan
1 year, 3 months ago
Selected Answer: D
Seems like a password compromise. Admin reset passwords and what we're seeing are simply the new MD5 hashed values
upvoted 3 times
...
ganymede
1 year, 3 months ago
Selected Answer: D
D. Password compromise
upvoted 3 times
...
licks0re
1 year, 3 months ago
Is that a protection against pass hash because the passwords are stored in hash format ? I dont think so.. I would go D.
upvoted 4 times
...
volc7
1 year, 3 months ago
Selected Answer: D
All values are diff. Probably a passed compromise triggered a reset for everyone
upvoted 3 times
...
Hs1208
1 year, 4 months ago
C. Pass the Hash as the recorded values are in hash representation rather than clear text.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago