exam questions

Exam SK0-005 All Questions

View all questions & answers for the SK0-005 exam

Exam SK0-005 topic 1 question 370 discussion

Actual exam question from CompTIA's SK0-005
Question #: 370
Topic #: 1
[All SK0-005 Questions]

Which of the following attacks is the most difficult to mitigate with technology?

  • A. Ransomware
  • B. Backdoor
  • C. SQL injection
  • D. Phishing
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
surfuganda
8 months ago
Selected Answer: D
A. Ransomware (INCORRECT) Ransomware can be mitigated with advanced endpoint protection, regular backups, and user education. Technologies like anti-malware tools, intrusion detection systems, and regular software updates are effective against ransomware. B. Backdoor (INCORRECT) Backdoors can be mitigated through regular system and network monitoring, vulnerability assessments, and the use of security tools designed to detect unauthorized access points. C. SQL Injection (INCORRECT) SQL injection can be mitigated with proper coding practices, such as the use of prepared statements and input validation. Web application firewalls (WAFs) and code audits are solutions against SQL injection attacks. ***D. Phishing (CORRECT) Phishing primarily exploits human factors rather than technology vulnerabilities, making it challenging to mitigate purely with technology.
upvoted 3 times
...
RBL23168
8 months, 1 week ago
Selected Answer: D
D. Phishing Phishing attacks rely heavily on social engineering tactics, manipulating individuals into divulging sensitive information or performing actions that compromise security. While technological measures such as email filters and anti-phishing tools can help detect and mitigate phishing attempts to some extent, they cannot entirely eliminate the human factor involved. Education and awareness among users are crucial to effectively combat phishing attacks.
upvoted 1 times
...
AzadOB
8 months, 1 week ago
Selected Answer: C
Mitigating each of these attacks presents its own set of challenges, but generally speaking, SQL injection (option C) is often considered one of the most difficult to mitigate with technology alone. SQL injection attacks target the vulnerability in web applications that use SQL databases. By injecting malicious SQL code into input fields, attackers can manipulate the database queries executed by the application, potentially gaining unauthorized access to data or performing other malicious actions.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago