exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 199 discussion

Actual exam question from CompTIA's SY0-701
Question #: 199
Topic #: 1
[All SY0-701 Questions]

A systems administrator notices that the research and development department is not using the company VPN when accessing various company-related services and systems. Which of the following scenarios describes this activity?

  • A. Espionage
  • B. Data exfiltration
  • C. Nation-state attack
  • D. Shadow IT
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
nillie
Highly Voted 7 months ago
Selected Answer: D
The scenario described is: D. Shadow IT Shadow IT refers to the use of technology, systems, or services by employees without the approval or knowledge of the IT department. In this case, the research and development department is bypassing the company’s VPN, potentially using unauthorized methods to access company-related services and systems. This can pose security risks, as these systems may not adhere to the company’s security policies and protocols.
upvoted 6 times
...
ITExperts
Most Recent 3 months, 1 week ago
Selected Answer: D
D, espionage given here is crazy lmao
upvoted 2 times
...
gingergroot
5 months ago
Selected Answer: B
B. Data exfiltration From the official CompTIA SYO-701 study guide - "Data exfiltration is the unauthorized transfer of data outside an organization and is a significant conern."
upvoted 1 times
gingergroot
5 months ago
*concern
upvoted 1 times
...
...
Honeybadge
5 months, 2 weeks ago
Selected Answer: B
This question is worded terribly as it isn't noted that the department is using shadow IT. One shouldn't just assume they are using unauthorized software or hardware. Or I could assume since they aren't using a VPN to provide them a secure tunnel when accessing company resources, they were compromised causing data to be exfiltrated. They are just simply not using their VPN to access authorized company services and systems. This seems to be more of a policy enforcement issue then anything.
upvoted 1 times
917a0a9
5 months, 1 week ago
The question makes no mention to doing anything with the data, especially exfiltrating it or moving the data elsewhere. It's D
upvoted 3 times
...
...
jsmthy
7 months, 1 week ago
Selected Answer: D
Using unauthorized software, eh Dave? The scenario may imply the use of an unofficial VPN for the sake of carrying out Espionage or Data Exfiltration, but there is no sign of it. The threat is the VPN rather the user or the data. Additionally, it doesn't seem like the nation-state attack would fit since the hallmarks of such an attack aren't present (lots of funding, firmware-level bugs, unique spyware, social engineering).
upvoted 3 times
...
MarDog
8 months, 3 weeks ago
Shadow IT is the use of IT-related hardware or software by a department or individual without the knowledge of the IT or security group within the organization.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago