exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 843 discussion

Actual exam question from CompTIA's SY0-501
Question #: 843
Topic #: 1
[All SY0-501 Questions]

A large financial services firm recently released information regarding a security breach within its corporate network that began several years before. During the time frame in which the breach occurred, indicators show an attacker gained administrative access to the network through a file download from a social media site and subsequently installed it without the user's knowledge. Since the compromise, the attacker was able to take command and control of the computer systems anonymously while obtaining sensitive corporate and personal employee information. Which of the following methods did the attacker MOST likely use to gain access?

  • A. A bot
  • B. A fileless virus
  • C. A logic bomb
  • D. A RAT
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
CoRell
Highly Voted 4 years, 10 months ago
I disagree. Should be RAT (remote access trojan) as per the hint in the description that the attacker gained C&C of the computer systems.
upvoted 42 times
vaxakaw829
4 years, 10 months ago
Definitely RAT A remote access Trojan (RAT) is a type of malware that allows attackers to take control of systems from remote locations. It is often delivered via drive-by downloads. ... Some RATs automatically collect and log keystrokes, usernames and passwords, incoming and outgoing email, chat sessions, and browser history as well as take screenshots. The RAT can then automatically send the data to the attackers at predetermined times. ... It’s common for attackers to exploit this one infected system and quickly infect the entire network with additional malware, including installing RATs on other systems. (Darril Gibson’s Get Certified Get Ahead p. 442)
upvoted 12 times
...
...
hlwo
Highly Voted 4 years, 8 months ago
RAT is wrong because of this "file download from a social media site and subsequently installed it without the user's knowledge" . Trojan is hide a malware in something that the user is interesting to download. In this case the download happened without the user's knowledge. The only answer left after that is a BOT.
upvoted 8 times
Poker69
4 years, 7 months ago
Common infection method Remote Access Trojans can be installed in a number of methods or techniques, and will be similar to other malware infection vectors. Specially crafted email attachments, web-links, download packages, or .torrent files could be used as a mechanism for installation of the software. Targeted attacks by a motivated attacker may deceive desired targets into installing such software via social engineering tactics, or even via temporary physical access of the desired computer.
upvoted 1 times
...
...
KelvinYau
Most Recent 8 months ago
Selected Answer: D
RAT (Remote Access Trojan): This type of malware allows an attacker to gain remote control over a victim's computer. In this case, the attacker gained administrative access through a file downloaded from a social media site and was able to control the systems and obtain sensitive information without the user's knowledge, which aligns perfectly with the characteristics of a RAT.
upvoted 1 times
...
Eromons
1 year, 1 month ago
Its RAT (REMOTE ACCESS CONTROL)
upvoted 1 times
...
chiachuang
1 year, 8 months ago
Selected Answer: D
obtaining sensitive corporate and personal employee information
upvoted 1 times
...
Ayo2023
2 years, 6 months ago
A RAT seems more likely, it is a type of malware that was created to specifically do just that.
upvoted 1 times
...
MarciaL
2 years, 8 months ago
D. Remote access trojans(RATs) are malware designed to allow an attacker to remotely control an infected computer.
upvoted 1 times
...
fonka
3 years, 11 months ago
Key word .,computers... and ...command... A bot attack is simply can be described as all infected computers will act zombies commanded by the server all these individual not in the a computer collectively called bonnets. They work based on a certain command from the hackers who control,manage,and guide them Answer is A bot The term “bot” comes from the English word “robot”. Similar to mechanical robots, internet bots are programmed to perform specific repetitive tasks. To do so, they execute clearly defined commands through algorithms and scripts which they can do faster than any human could. Bots are thus computer programs that operate autonomously and automatically and do not depend on human input or supervision to perform their functions.
upvoted 1 times
...
Dion79
4 years ago
I have to go with D. "INITIAL EXPLOITATION In the initial exploitation phase (also referred to as weaponization), an exploit is used to gain some sort of access to the target's network. This initial exploitation might be accomplished using a phishing email and payload or by obtaining credentials via social engineering. PERSISTENCE Persistence refers to the tester's ability to reconnect to the compromised host and use it as a Remote Access Tool (RAT) or backdoor. To do this, the tester must establish a Command and Control (C2 or C&C) network to use to control the compromised host (upload tools and download data). The connection to the compromised host will typically require a malware executable to run and a connection to a network port and the attacker's IP address (or range of IP addresses) to be available. Persistence will be followed by further reconnaissance, where the pen tester attempts to map out the internal network and discover the services running on it and accounts configured to access it." Reference: COM501B
upvoted 1 times
...
StickyMac
4 years ago
key words here: to take command and control which is what bot is,. It doesn't states remote connection.
upvoted 1 times
...
Computerguy
4 years, 1 month ago
A RAT allows for remote Administrative control of your system, the keywords here are "take command and control of computer systems anonymously" Answer is D
upvoted 2 times
...
Cryptomike87
4 years, 2 months ago
A bot is NOT a METHOD. A bot is a computer that is part of a botnet. The method used here is a RAT.
upvoted 7 times
...
PQwesi
4 years, 3 months ago
I found myself with an open mouth why it should be a BOT. I so much agree with all those who believe it should be a Remote Access Trojan aka RAT
upvoted 3 times
...
coti94
4 years, 3 months ago
A botnet basically is composed of two parts. On the one hand, there is the control panel, where the actions to be executed are centralized, and on the other hand there is the server, which is a small program that establishes the connection with the cybercriminal’s control center. So far it might look pretty much like a Trojan, as it is made up of a control panel and a server application. Additionally, its functions include the ability to steal files, upload applications, execute processes on victim hardware and, by means of a keylogger, capture every keystroke made on the keyboard.
upvoted 1 times
...
nakres64
4 years, 4 months ago
The given answer is correct. The question can separate into two parts. Up to first compromise attacker use RAT (keywords: administrative, anonymously, install software). A compromised host is installed with one or more bots and these bots gain access and obtain the sensitive information (keywords: command and control)
upvoted 1 times
...
yalight
4 years, 6 months ago
HELP, what is the difference between RAT and BOT? lol
upvoted 2 times
exiledwl
4 years, 6 months ago
I'd recommend viewing messer's videos or gibson book and having a firm understanding of these concepts and then using this practice exam as the last study source.
upvoted 5 times
...
...
certpro
4 years, 6 months ago
Given answer "Bot" is correct. DG's book P#276 , and keywords are "Without Users knowledge" and "Command and control"
upvoted 2 times
JosePulickal
4 years, 6 months ago
I believe there is enough arguments in above discussions proving that this is RAT. RAT and BOT's both use the elements of 'Command and Control' and both execute without the users knowledge. If we pay attention to the intent of the hack it leans towards RAT.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...