exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 77 discussion

Actual exam question from CompTIA's SY0-701
Question #: 77
Topic #: 1
[All SY0-701 Questions]

HOTSPOT -
You are a security administrator investigating a potential infection on a network.

INSTRUCTIONS -
Click on each host and firewall. Review all logs to determine which host originated the infection and then identify if each remaining host is clean or infected.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.






Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Fazliddin4515
Highly Voted 11 months, 4 weeks ago
Why Are you choosing random answers. Here is real answers => { 22 is Origin. It has started infection first. 37 is Clean, because it is able to get new updates and quarantine malicious file. 41 is Infected, because it was not able to quarantine infected file. 12 is Clean, because it is able to get new updates and quarantine malicious file. 18 is Infected, because it was not able get new update and qurantine file. These are real answers.
upvoted 127 times
MLKTKN
2 months, 4 weeks ago
Quarantine doesn't mean it hasn't infected. 37 and 12 still suspicious we don't. Know yet if it is clean or infected, I say all are infected and 22 is the origin
upvoted 1 times
...
MLKTKN
3 months ago
could you please someone tell me whether the reveal solutions are correct or not because it says 41 is origin and remain is infected
upvoted 2 times
...
trustedtester2
3 months, 1 week ago
This is the right answer, ignore all the rest of people saying another things
upvoted 2 times
...
Damique
5 months, 1 week ago
correct!
upvoted 1 times
...
...
c80f5c5
Highly Voted 11 months, 1 week ago
Commenting to reiterate Fazliddin's comment: .22 infected at 2:31AM, it was infected 12 hrs before all other IPs .37 clean, quarantined at 2:43PM .41 infected at 2:43PM .12 clean, quarantined at 2:43PM .18 infected at 2:43PM I took a Sec+ Bootcamp and they went over this lab, these are the answers they gave us.
upvoted 36 times
...
kalmax5400
Most Recent 2 months, 1 week ago
Here are the solutions: 41 origin 37 infected 18 Infected 12 infected
upvoted 1 times
Russell15
2 months ago
No. .22 is the origin since at 2:31AM, it was infected 12 hrs before all other IPs .37 clean, quarantined at 2:43PM .41 infected at 2:43PM .12 clean, quarantined at 2:43PM .18 infected at 2:43PM
upvoted 1 times
...
...
MLKTKN
3 months ago
REVEAL SOLUTION says so the REVEAL SOLUTIONS are not correct? 22 Infected 37 infected 41 origin 12 infected 18 Infected
upvoted 2 times
...
AKA1987
3 months, 1 week ago
192.168.10.22 ✅ Clean 192.168.10.37 🔴 Infected 192.168.10.41 🔴 Infected 10.10.9.12 🔴 Infected 10.10.9.18 🔴 Infected (Origin) - The firewall logs indicate that 10.10.9.18 was the first to establish outbound communication (16:01:44) to an external IP (57.203.54.183) over SSL (port 443). This is an early indicator that 10.10.9.18 may be the true origin of the infection.
upvoted 3 times
...
AKA1987
3 months, 1 week ago
DeepSeek says: Host Status 192.168.10.22 ✅ Clean 192.168.10.37 🔴 Infected (Origin) 192.168.10.41 🔴 Infected 10.10.9.12 🔴 Infected 10.10.9.18 🔴 Infected
upvoted 1 times
MLKTKN
2 months, 4 weeks ago
no deepseek says 22 is origin
upvoted 2 times
...
...
1798e2e
6 months, 2 weeks ago
smbv1 looks to be the obvious port of issue, however there's a bigger giveaway above it that has an rpc call happening from .22. Blaster worm is malware that uses RPC to infect and transfer. The difference between gpt and reality can be staggering sometimes. Fazliddin has this right. a pc that has quarantined something is not considered infected as it's now sitting in a secure system preventing any further transfer/ malicious activity.
upvoted 2 times
...
01a4c2e
6 months, 2 weeks ago
10.22 ~~~~~~~~~~~~~~~~~~~~~~ scvh0st.exe disabled schedule scan and update on 4/18 @ 2:31-32 (Infected/Origin) FW >>> 4/18 @ 2:31 57.203.55.29:8080 http 10.37 ~~~~~~~~~~~~~~~~~~~~~~ scvh0st.exe found and quarantined on 4/18 @ 14:37 (Clean) 10.41 ~~~~~~~~~~~~~~~~~~~~~~ scvh0st.exe matched heuristic pattern but unable to quarantine file on 4/18 @ 14:37 and then after another scan was not listed a quarantined. (Infected) 9.12 ~~~~~~~~~~~~~~~~~~~~~~ scvh0st.exe found and quarantined on 4/18 @ 14:37 (Clean) 9.18 ~~~~~~~~~~~~~~~~~~~~~~ scvh0st.exe matched heuristic pattern but unable to quarantine file on 4/18 @ 14:37 and then after another scan was not listed a quarantined. (Infected)
upvoted 5 times
...
Monopeeya
7 months ago
.37 reached out over the internet after the initial virus scan on the 17th, which we know can detect the virus regardless of infected status. It was on 443 (secure port) but was using SSL (outdated insecure) instead of TLS. This was their "gotcha". Viruses do not come out of nowhere. It had to be one of the two that reached out to the internet after the first scan. You would not see the lateral communication of IPs on either side of the firewall because they are not talking across it. The 192 side of the firewall were the only ones to start trying to make connections to check software version of the 10 side of the firewall. .22 - smbv1 - least secure. Had AV scan completely disabled. .41 .18 -smbv2 - little more secure. Was able to prevent definition updates. Preventing QT. .12 .37 -smbv3 - secure. Was not able to modify AV scan. Definitions updated. Malware QT.
upvoted 2 times
...
Monopeeya
7 months ago
TLDR THE ORIGIN IS NOT .22 .37 Origin (QT'd) .22 (Still Infected) .41 (Still Infected) .12 (QT'd) .18 (Still Infected) I do not know if Comptia considers a host with quarantined malware as infected, but all PCs had the malware. Here is the break down if you are interested..
upvoted 1 times
...
jsmthy
7 months, 2 weeks ago
22 Infected 37 Origin 41 Infected 12 Clean 18 Infected 192.168.10.37 is the origin point because it is 1 of 2 IP addresses that accessed the public internet prior to 02:30, has a visible file transfer chain, and is tied to active reconnaissance activity. Furthermore, we must note the firewall's location means only cross firewall access is recorded to the log. Lateral movement is not recorded. Let's get rid of the incumbent answer: 22 can't be the origin because we must take the host log on the 17th as fact that 22 was clean at that time, otherwise the scan should have triggered the heuristic match on the 17th. It would not have started its own infection when it was perfectly fine and there is no proof of other file transfers other than the firewall itself. No, I believe 22 was selected as a host with persistence and the process looks like this: 37 is infected at 16:01 via a malicious file. 12 is infected at 16:35 via SMBv2. 12 sends out a ping sweep at 23:58, identifying active machines on the network. 22 executes post-exploit payload at 02:30. 18 performs what looks like exfiltration (9GB) at 02:39. This is the limit of what I see with these logs. Maybe I'm overthinking it since it is this a Comptia exam.
upvoted 1 times
...
FrozenCarrot
8 months ago
10.22 Origin 10.37 Clean 10.41 Infected 9.12 Clean 9.18 Infected
upvoted 2 times
...
PAWarriors
8 months, 1 week ago
Correct answers: 10.22 --> started the infection and scvh0st.exe disabled scheduled scan and update. (Origin) 10.37 --> the malicious file was in quarantine and it got a new update. (Clean) 10.41 --> No update unable to quarantine file. (Infected) 9.12 --> the malicious file was in quarantine and it got a new update. (Clean) 9.18 --> No update and unable to quarantine. (Infected)
upvoted 2 times
...
3330278_111
8 months, 2 weeks ago
If .22 is the Origin, then it's also infected, right? The scan got disabled right away, and it continued spreading to the other computers afterwards. So I'm checking both Origin and Infected for .22 if they allow me to
upvoted 2 times
...
barracouto
9 months, 3 weeks ago
If I get this question i'm going to think "OH boy do I miss cici's pizza" 22- Origin - OH CICI 37 - Clean 41 - Infected 12 - Clean 18 - Infected
upvoted 12 times
Viknikpik
2 months, 3 weeks ago
Did you get this question, were any of the question on there.
upvoted 1 times
...
...
WOW_ThatsCrazy
10 months ago
192.168.10.22 Status: Clean Reasoning: The scan completed without finding any issues. 192.168.10.37 Status: Infected Reasoning: The scan found and quarantined the file svch0st.exe. 192.168.10.41 Status: Infected Reasoning: The scan found the file svch0st.exe but was unable to quarantine it. 10.10.9.12 Status: Origin Reasoning: The firewall log shows traffic from 10.10.9.12 to multiple IP addresses in the network, indicating it may have spread the infection. Additionally, the scan found and quarantined svch0st.exe. 10.10.9.18 Status: Infected Reasoning: The scan found the file svch0st.exe but was unable to quarantine it, similar to 192.168.10.41.
upvoted 2 times
...
jennyka76
10 months, 2 weeks ago
I AGREE 22 is Origin. It has started infection first. 37 is Clean, because it is able to get new updates and quarantine malicious file. 41 is Infected, because it was not able to quarantine infected file. 12 is Clean, because it is able to get new updates and quarantine malicious file. 18 is Infected, because it was not able get new update and qurantine file.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago