exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 179 discussion

Actual exam question from CompTIA's SY0-501
Question #: 179
Topic #: 1
[All SY0-501 Questions]

A security administrator returning from a short vacation receives an account lock-out message when attempting to log into the computer. After getting the account unlocked the security administrator immediately notices a large amount of emails alerts pertaining to several different user accounts being locked out during the past three days. The security administrator uses system logs to determine that the lock-outs were due to a brute force attack on all accounts that has been previously logged into that machine.
Which of the following can be implemented to reduce the likelihood of this attack going undetected?

  • A. Password complexity rules
  • B. Continuous monitoring
  • C. User access reviews
  • D. Account lockout policies
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Hanzero
Highly Voted 4 years, 7 months ago
B is correct. Account lockout already happened and the policy is in place.
upvoted 8 times
...
MelvinJohn
Highly Voted 5 years, 3 months ago
B. Continuous Monitoring (automated) - Human interactions are very distinct from the behavior of automated attacks. This isn’t detected by looking at the behavior or path of URLs accessed, but more specifically at all aspects of what the user (or bot) is doing with the browser and application. The catch is that behavioral fingerprint methods require not only a high level of sensing capabilities, but also massively parallel computation infrastructure that is optimized specifically to the task of real-time evaluation of large amounts of sensor data. Without such large-scale, real-time analysis capabilities, keeping pace with the speed and evolution of today’s attacks is not even remotely possible.
upvoted 6 times
...
hlwo
Most Recent 4 years, 7 months ago
Key word "going undetected"
upvoted 2 times
...
kdce
4 years, 10 months ago
B, Continuous monitoring
upvoted 2 times
...
Basem
5 years, 8 months ago
User access does it mean permissions here ? Or login logs ? Just not to confuse anyone the answer is correct continuous monitoring.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago