exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 77 discussion

Actual exam question from CompTIA's SY0-601
Question #: 77
Topic #: 1
[All SY0-601 Questions]

After returning from a conference, a user's laptop has been operating slower than normal and overheating, and the fans have been running constantly. During the diagnosis process, an unknown piece of hardware is found connected to the laptop's motherboard. Which of the following attack vectors was exploited to install the hardware?

  • A. Removable media
  • B. Spear phishing
  • C. Supply chain
  • D. Direct access
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
YusufMadkour
Highly Voted 2 years, 10 months ago
Selected Answer: D
D because no hardware can be installed on the motherboard unless the perpetrator had direct access to the machine.
upvoted 39 times
Sandon
2 years, 5 months ago
Or the supply chain
upvoted 9 times
scarceanimal
2 years, 4 months ago
that's not an attack vector
upvoted 7 times
CTE_Instructor
2 years, 3 months ago
Security+ 601 Objectives Section 1.5 Explain different threat actors, vectors, and intelligence sources. Vectors: * Direct Access * Email * Supply Chain * Social Media * Removable media * Cloud The answer is *most likely* direct access, as the problem started after going to the conference. It's implied someone gained physical access to this laptop and installed hardware on the motherboard -or- plugged in a USB drive. It's unlikely, however it's possible a supply chain attacker could have also installed hardware inside the laptop prior to shipping to a company. Either way, the attacker would have needed direct access to complete this attack. It's more general than the other options, and covers all possibilities.
upvoted 16 times
ankiuser
2 years, 2 months ago
But the user could have found the USB on the floor and plugged it in themselves, so the attacker doesn't need direct access.
upvoted 1 times
TreeeSon
1 year, 9 months ago
DO NOT make assumptions on CompTIA exams. If it isn't stated, it never happened.
upvoted 12 times
...
...
...
...
...
80drag
2 years, 9 months ago
but it doesnt say installed just connected. The usb connector is attached to the motherboard
upvoted 6 times
80drag
2 years, 9 months ago
I redact the previous statement
upvoted 3 times
...
TheDarkSide2405
2 years, 5 months ago
USB doesn't unknown piece of hardware
upvoted 6 times
...
...
...
Boogie_79
Highly Voted 2 years, 10 months ago
Selected Answer: D
Direct access
upvoted 6 times
...
Dapsie
Most Recent 1 year, 1 month ago
Even attaching removable media requires direct access. I am convinced the attack vector that was exolited is Direct Access.
upvoted 1 times
...
plunky12487
1 year, 2 months ago
Removable media. It's unlikely someone is going to take the time to tear the device apart and install something on the motherboard? What would they install? The USB goes directly to the motherboard, that's easier. Comp Tia is tricky. The question is bs, which is why it's always the answer they want
upvoted 1 times
...
BD69
1 year, 3 months ago
Selected Answer: D
Direct Access is the only possible answer here. Removable media is a KNOWN piece of hardware and it not accessed via the motherboard.
upvoted 1 times
...
_Bella
1 year, 3 months ago
Selected Answer: C
n a supply chain attack, attackers target the hardware or software supply chain of a product to introduce malicious components or compromise legitimate ones. This type of attack often occurs during the manufacturing, distribution, or assembly process, allowing attackers to infiltrate the supply chain and tamper with products before they reach end-users.
upvoted 2 times
RyanL26
1 year, 2 months ago
I thought this as well. After thinking about it, it would still be Direct Access if it was done at the vendor. The attacker had direct access to the vendors product, making the answer D.
upvoted 1 times
...
...
MasterControlProgram
1 year, 3 months ago
Selected Answer: A
(A) is the answer, question is asking what was used. Not how it was executed.
upvoted 2 times
BD69
1 year, 3 months ago
It doesn't ask what was used at all. Read the question
upvoted 1 times
...
...
BD69
1 year, 4 months ago
Selected Answer: D
A is out (it's directly connected to the motherboard) B is out (it's a piece of hardware, and no phishing method can replace hardware) C is out (the problem began after a conference - if it were a supply chain issue, it would have already been noticed) D is the obvious answer, here, as you cannot attach anything to a motherboard without direct access
upvoted 1 times
...
Teleco0997
1 year, 7 months ago
Selected Answer: D
the question is "which attack VECTORS" were used, removable media is not the vector is the device
upvoted 1 times
...
goodmate
1 year, 8 months ago
Answer D A- USB is well known B- Spear phishing is not a physical component C- Supply chain, if the laptop has issues after purchase, this may be supply chain attack but crucial point is after the conference, so this option is not true D- direct access is answer. Because someone implement a unknown piece of hardware to the motherboard in order to gain access the laptop.
upvoted 2 times
...
Thurams
1 year, 8 months ago
1. The user's laptop showed signs of being compromised after returning from a conference. 2. An unknown piece of hardware was found connected to the laptop's motherboard. Supply chain attacks involve tampering with or compromising the hardware or software components of a product at some point in the supply chain. In this case, the unknown hardware connected to the laptop's motherboard was likely added during the laptop's journey through the supply chain. Therefore, the correct answer is C. Supply Chain.
upvoted 1 times
...
Gwcan
1 year, 8 months ago
Selected Answer: D
Everyone choosing A didn't even read the question. Which attack vector was used to install the HARDWARE? Removable media is used to install SOFTWARE, not HARDWARE. Direct access is needed to install HARDWARE.
upvoted 5 times
Mhoward89
1 year, 1 month ago
BRO!!!! Thank You!!! D is the correct answer
upvoted 1 times
...
...
goodmate
1 year, 8 months ago
ChatCGT and its apologize :I apologize for any confusion in my previous responses. Based on the additional information that "an unknown piece of hardware is found connected to the laptop's motherboard," the most appropriate assumption is that this unknown hardware was physically connected to the laptop's motherboard during or after the conference. Given this specific detail, the supply chain attack, where a compromised component is introduced during manufacturing or distribution, becomes less likely. Instead, the scenario suggests a scenario closer to "direct access," where someone had physical access to the laptop, either during the conference or afterward, and connected the unknown hardware to the motherboard. Therefore, considering the presence of the unknown hardware, the attack vector "Direct access" becomes a more plausible explanation for the situation described in the scenario.
upvoted 2 times
...
Dogeo
1 year, 10 months ago
A Removable Media. Direct Access is being physically at the device to perform malicious acts rather than the use of software or hardware, the question says that hardware has been connected to the mother board, everything including USB ports are connected to the motherboard so this dose not rule out USB hardware Although they would need Direct Access to attach the hardware it is the hardware itself causing the issue.
upvoted 1 times
daddylonglegs
1 year, 8 months ago
The question asks "Which attack vector was exploited TO INSTALL THE HARDWARE" This question is asking what the attacker exploited to install the hardware, nothing about the follow on activity. The attacker had to have DIRECT ACCESS to install anything at all.
upvoted 4 times
...
...
Dogeo
1 year, 10 months ago
Its A, the question states unknow hardware has been attached to the motherboard (removeable media) Direct access would be the malicious user performing an attack while physically at the device.
upvoted 2 times
...
RevolutionaryAct
1 year, 10 months ago
Selected Answer: A
Well I learned something new, you can directly add removable media to the motherboard, whic is what I picked but for different reasons. One could say direct access but hardware attached to a motherboard is removable: https://www.howtogeek.com/201493/ask-htg-can-i-plug-a-usb-device-right-into-my-motherboard/
upvoted 2 times
daddylonglegs
1 year, 8 months ago
Again, the question is asking about what the attacker exploited to install the hardware in the first place. Whether or not it can be classified as removable media is irrelevant as the attacker needs direct access to do anything at all.
upvoted 2 times
...
...
sujon_london
1 year, 10 months ago
Selected Answer: A
This very straight forward question with given clue that found hardware connected with motherboard. As we all know that any USB port connected with motherboard of the Computer. It’s simple of-course we maybe thinking critically due to CompTIA or easy option given.
upvoted 1 times
BD69
1 year, 4 months ago
That's way too ambiguous. I mean, you could say anything plugged into a laptop (HDMI, power cable, battery, mouse, external display or keyboard, headset, etc) is connected to the motherboard. But really they are all connecting via an external jack or port (a proxy, if you will). In A or D, you need direct access.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...