Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-601 topic 1 question 77 discussion

Actual exam question from CompTIA's SY0-601
Question #: 77
Topic #: 1
[All SY0-601 Questions]

After returning from a conference, a user's laptop has been operating slower than normal and overheating, and the fans have been running constantly. During the diagnosis process, an unknown piece of hardware is found connected to the laptop's motherboard. Which of the following attack vectors was exploited to install the hardware?

  • A. Removable media
  • B. Spear phishing
  • C. Supply chain
  • D. Direct access
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
YusufMadkour
Highly Voted 1 year, 8 months ago
Selected Answer: D
D because no hardware can be installed on the motherboard unless the perpetrator had direct access to the machine.
upvoted 37 times
Sandon
1 year, 3 months ago
Or the supply chain
upvoted 8 times
scarceanimal
1 year, 2 months ago
that's not an attack vector
upvoted 6 times
CTE_Instructor
1 year, 1 month ago
Security+ 601 Objectives Section 1.5 Explain different threat actors, vectors, and intelligence sources. Vectors: * Direct Access * Email * Supply Chain * Social Media * Removable media * Cloud The answer is *most likely* direct access, as the problem started after going to the conference. It's implied someone gained physical access to this laptop and installed hardware on the motherboard -or- plugged in a USB drive. It's unlikely, however it's possible a supply chain attacker could have also installed hardware inside the laptop prior to shipping to a company. Either way, the attacker would have needed direct access to complete this attack. It's more general than the other options, and covers all possibilities.
upvoted 15 times
ankiuser
1 year ago
But the user could have found the USB on the floor and plugged it in themselves, so the attacker doesn't need direct access.
upvoted 1 times
TreeeSon
7 months, 1 week ago
DO NOT make assumptions on CompTIA exams. If it isn't stated, it never happened.
upvoted 10 times
...
...
...
...
...
80drag
1 year, 7 months ago
but it doesnt say installed just connected. The usb connector is attached to the motherboard
upvoted 6 times
80drag
1 year, 7 months ago
I redact the previous statement
upvoted 3 times
...
TheDarkSide2405
1 year, 3 months ago
USB doesn't unknown piece of hardware
upvoted 6 times
...
...
...
Boogie_79
Highly Voted 1 year, 8 months ago
Selected Answer: D
Direct access
upvoted 6 times
...
BD69
Most Recent 1 month ago
Selected Answer: D
Direct Access is the only possible answer here. Removable media is a KNOWN piece of hardware and it not accessed via the motherboard.
upvoted 1 times
...
_Bella
1 month, 1 week ago
Selected Answer: C
n a supply chain attack, attackers target the hardware or software supply chain of a product to introduce malicious components or compromise legitimate ones. This type of attack often occurs during the manufacturing, distribution, or assembly process, allowing attackers to infiltrate the supply chain and tamper with products before they reach end-users.
upvoted 1 times
RyanL26
1 week, 3 days ago
I thought this as well. After thinking about it, it would still be Direct Access if it was done at the vendor. The attacker had direct access to the vendors product, making the answer D.
upvoted 1 times
...
...
MasterControlProgram
1 month, 2 weeks ago
Selected Answer: A
(A) is the answer, question is asking what was used. Not how it was executed.
upvoted 2 times
BD69
1 month ago
It doesn't ask what was used at all. Read the question
upvoted 1 times
...
...
BD69
1 month, 4 weeks ago
Selected Answer: D
A is out (it's directly connected to the motherboard) B is out (it's a piece of hardware, and no phishing method can replace hardware) C is out (the problem began after a conference - if it were a supply chain issue, it would have already been noticed) D is the obvious answer, here, as you cannot attach anything to a motherboard without direct access
upvoted 1 times
...
Teleco0997
5 months, 1 week ago
Selected Answer: D
the question is "which attack VECTORS" were used, removable media is not the vector is the device
upvoted 1 times
...
goodmate
6 months, 2 weeks ago
Answer D A- USB is well known B- Spear phishing is not a physical component C- Supply chain, if the laptop has issues after purchase, this may be supply chain attack but crucial point is after the conference, so this option is not true D- direct access is answer. Because someone implement a unknown piece of hardware to the motherboard in order to gain access the laptop.
upvoted 2 times
...
Thurams
6 months, 2 weeks ago
1. The user's laptop showed signs of being compromised after returning from a conference. 2. An unknown piece of hardware was found connected to the laptop's motherboard. Supply chain attacks involve tampering with or compromising the hardware or software components of a product at some point in the supply chain. In this case, the unknown hardware connected to the laptop's motherboard was likely added during the laptop's journey through the supply chain. Therefore, the correct answer is C. Supply Chain.
upvoted 1 times
...
Gwcan
6 months, 2 weeks ago
Selected Answer: D
Everyone choosing A didn't even read the question. Which attack vector was used to install the HARDWARE? Removable media is used to install SOFTWARE, not HARDWARE. Direct access is needed to install HARDWARE.
upvoted 4 times
...
goodmate
6 months, 3 weeks ago
ChatCGT and its apologize :I apologize for any confusion in my previous responses. Based on the additional information that "an unknown piece of hardware is found connected to the laptop's motherboard," the most appropriate assumption is that this unknown hardware was physically connected to the laptop's motherboard during or after the conference. Given this specific detail, the supply chain attack, where a compromised component is introduced during manufacturing or distribution, becomes less likely. Instead, the scenario suggests a scenario closer to "direct access," where someone had physical access to the laptop, either during the conference or afterward, and connected the unknown hardware to the motherboard. Therefore, considering the presence of the unknown hardware, the attack vector "Direct access" becomes a more plausible explanation for the situation described in the scenario.
upvoted 1 times
...
Dogeo
8 months ago
A Removable Media. Direct Access is being physically at the device to perform malicious acts rather than the use of software or hardware, the question says that hardware has been connected to the mother board, everything including USB ports are connected to the motherboard so this dose not rule out USB hardware Although they would need Direct Access to attach the hardware it is the hardware itself causing the issue.
upvoted 1 times
daddylonglegs
6 months, 2 weeks ago
The question asks "Which attack vector was exploited TO INSTALL THE HARDWARE" This question is asking what the attacker exploited to install the hardware, nothing about the follow on activity. The attacker had to have DIRECT ACCESS to install anything at all.
upvoted 4 times
...
...
Dogeo
8 months, 1 week ago
Its A, the question states unknow hardware has been attached to the motherboard (removeable media) Direct access would be the malicious user performing an attack while physically at the device.
upvoted 2 times
...
RevolutionaryAct
8 months, 3 weeks ago
Selected Answer: A
Well I learned something new, you can directly add removable media to the motherboard, whic is what I picked but for different reasons. One could say direct access but hardware attached to a motherboard is removable: https://www.howtogeek.com/201493/ask-htg-can-i-plug-a-usb-device-right-into-my-motherboard/
upvoted 2 times
daddylonglegs
6 months, 2 weeks ago
Again, the question is asking about what the attacker exploited to install the hardware in the first place. Whether or not it can be classified as removable media is irrelevant as the attacker needs direct access to do anything at all.
upvoted 2 times
...
...
sujon_london
8 months, 3 weeks ago
Selected Answer: A
This very straight forward question with given clue that found hardware connected with motherboard. As we all know that any USB port connected with motherboard of the Computer. It’s simple of-course we maybe thinking critically due to CompTIA or easy option given.
upvoted 1 times
BD69
1 month, 4 weeks ago
That's way too ambiguous. I mean, you could say anything plugged into a laptop (HDMI, power cable, battery, mouse, external display or keyboard, headset, etc) is connected to the motherboard. But really they are all connecting via an external jack or port (a proxy, if you will). In A or D, you need direct access.
upvoted 1 times
...
...
Protract8593
9 months, 1 week ago
Selected Answer: D
In the given scenario, the laptop issues started after the user returned from a conference. Furthermore, an unknown piece of hardware was found connected to the laptop's motherboard. These details indicate that someone had physical access to the laptop and inserted the unknown hardware directly. A direct access attack involves an attacker physically accessing a device to compromise it. In this case, the attacker likely inserted malicious hardware or tampered with the laptop's internal components to gain unauthorized access and control over the system. Why A and C are wrong according to ChatGPT: - A. Removable media: This option involves using external devices like USB drives, CDs, or DVDs to introduce malware to a system. While it's a possible attack vector, it does not explain the presence of unknown hardware on the laptop's motherboard. - C. Supply chain: A supply chain attack involves compromising devices or components during the manufacturing or distribution process. In this case, the laptop was not new, and the issue occurred after the user returned from a conference, making a supply chain attack less likely.
upvoted 2 times
...
Aleem001
9 months, 2 weeks ago
Selected Answer: A
Come on Guys, Have you ever opened a computer to see the motherboard, its A, as USB port is connected to the motherboard after all, plus it happed in the conference room, not in any computer hardware Lab.
upvoted 2 times
BD69
1 month, 4 weeks ago
Yes, a USB port is connected to the motherboard, ALL ports are connected to the motherboard, but ALL devices are connected to the ports (not the motherboard). Ports are physical proxies to the motherboard.
upvoted 1 times
...
Aleem001
9 months, 2 weeks ago
Scenario says : unknown piece of hardware is found.
upvoted 2 times
...
daddylonglegs
6 months, 2 weeks ago
Again, the question is asking about what the attacker exploited to install the hardware in the first place. Whether or not it can be classified as removable media is irrelevant as the attacker needs direct access to do anything at all.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...