exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 84 discussion

Actual exam question from CompTIA's SY0-601
Question #: 84
Topic #: 1
[All SY0-601 Questions]

A penetration tester was able to compromise an internal server and is now trying to pivot the current session in a network lateral movement. Which of the following tools, if available on the server, will provide the MOST useful information for the next assessment step?

  • A. Autopsy
  • B. Cuckoo
  • C. Memdump
  • D. Nmap
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 10 months ago
Selected Answer: D
Autopsy is a digital forensics analysis tool - maily targetted to hard drive analysis - not very helpful for the requeriments Nmap would be the correct answer. we want to pivot to another devices on the NETWORK, so next step is to do reconnaisance, port scanning, etc
upvoted 38 times
...
Demilitarized_zone
Highly Voted 2 years, 8 months ago
WHY ARE THE ADMIN GIVING US WRONG ANSWERS PLEASE. THIS IS WICKED. COME ON
upvoted 31 times
NerdAlert
2 years, 3 months ago
so we dont get shut down! check discussions
upvoted 27 times
loccodennis
2 years, 1 month ago
Is there a way to access non purchased comptia things anymore? all of the tests are gone for me
upvoted 1 times
will305
2 years ago
as long as you're logged in you can google the pages. "exam name" examtopics
upvoted 1 times
...
saucehozz
1 year, 7 months ago
Use a VPN outside the U.S.
upvoted 1 times
...
...
...
8c55165
1 year, 6 months ago
CompTIA forces sites to remove their content if it's too accurate. That's why there's discussions here.
upvoted 7 times
...
...
bknum9
Most Recent 1 year, 4 months ago
Selected Answer: D
D. Nmap
upvoted 1 times
...
dfc6822
1 year, 5 months ago
C. Memdump Memdump is a tool used to create a dump of a system's memory. In a penetration testing scenario, having access to a memory dump can be highly valuable for the penetration tester. It allows the tester to analyze the contents of the system's memory, potentially extracting sensitive information, credentials, or other data that can aid in further lateral movement within the network.
upvoted 1 times
...
MortG7
1 year, 5 months ago
C. Memdump In the context of lateral movement during penetration testing, a memory dump (memdump) from a compromised system can contain valuable information such as credentials, tokens, and other artifacts that may aid in further exploitation or privilege escalation within the network. Analyzing the contents of memory can reveal sensitive information about the running processes and system state.
upvoted 3 times
...
cyberPunk28
1 year, 6 months ago
Selected Answer: D
D. Nmap
upvoted 1 times
...
Ruger
1 year, 8 months ago
D. Nmap Nmap (Network Mapper) is a powerful network scanning tool that can be used to discover information about devices on a network. In this scenario, the penetration tester can use Nmap to scan the internal network from the compromised server to identify potential targets for lateral movement and gather information about their services and vulnerabilities. This information is crucial for planning the next steps in the assessment.
upvoted 3 times
...
Abbey2
1 year, 9 months ago
C. Memdump Explanation: In this scenario, the penetration tester has compromised an internal server and is attempting lateral movement within the network. To determine the most useful information for the next assessment step, memory analysis can be critical. Memory analysis tools like "memdump" are used to capture the content of a server's memory at a specific point in time. Analyzing this memory dump can reveal valuable information, including active processes, running services, user credentials, and potential vulnerabilities.
upvoted 1 times
...
malibi
1 year, 10 months ago
Selected Answer: A
Autopsy. Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It is used by law enforcement, military, and corporate examiners to investigate what happened on a computer.
upvoted 1 times
...
ccnaexam28
1 year, 11 months ago
this was on my exam. Took the exam 27/7/2023, i scored 840 and got 82 questions in total. 90%+ is from this site and I have no contributor access though I think it's also just luck on what set you'll get from their questions' pool. good luck!
upvoted 13 times
AmesCB
1 year, 11 months ago
congratulations! So what was the answer? or are you not allowed to say?
upvoted 3 times
needciscohelp
1 year, 8 months ago
Of course he's not "allowed" to say lol, just like this entire website wouldn't be allowed by CompTIA. We share anyways.
upvoted 1 times
...
...
Koki20
1 year, 8 months ago
congrat! Did you go with the community answer or with exam topic answer?
upvoted 1 times
...
tonnage800
1 year, 8 months ago
oh how could you access full questions without contributor access?
upvoted 1 times
...
...
Protract8593
1 year, 11 months ago
Selected Answer: D
Nmap is a versatile network scanning tool that can be used for various purposes, including network reconnaissance and discovering hosts and services on a computer network. In the given scenario, the penetration tester has already compromised an internal server and is looking to pivot and move laterally within the network. Running Nmap on the compromised server can provide valuable information about other hosts and services within the network, helping the tester identify potential targets for further exploitation. Nmap can reveal open ports, services, and operating systems on the target hosts, which can be useful for the penetration tester to plan their next steps. By understanding the network topology and available services, the tester can identify additional attack vectors and potential vulnerabilities to exploit for further lateral movement.
upvoted 3 times
...
LiteralGod
1 year, 11 months ago
Why would Nmap need to be available on the server ?
upvoted 1 times
...
Selected Answer: D
Nmap (Network Mapper) is a powerful network scanning tool that can be used for network exploration and security auditing. It can help the penetration tester gather information about the network, identify hosts, discover open ports, and detect services running on those ports. With this information, the tester can assess the network's topology, identify potential targets for lateral movement, and plan their next steps.
upvoted 1 times
...
aw23
2 years, 1 month ago
If a penetration tester has already compromised a server and is attempting to move laterally through the network, the focus is more likely to be on gaining access to additional systems and extracting information from the compromised system. Therefore, tools like Memdump, which can provide information about the state of the system and active network connections, are more relevant in this context.
upvoted 2 times
daddylonglegs
1 year, 8 months ago
Maybe, maybe not. But you're not reading the key part of the question, which is the attacker is looking to achieve lateral movement. Memdump would not be very helpful in obtaining lateral movement
upvoted 2 times
...
...
Yawannawanka
2 years, 2 months ago
If the goal is to pivot the current session in a network lateral movement, the most useful tool would be Nmap, as it can be used to scan the local network for other vulnerable machines that can be targeted. So the correct answer is D.
upvoted 2 times
...
NerdAlert
2 years, 3 months ago
a memdump would be more helpful for identifying suspicious processes, but with nmap you can scan for what connections are opening on the other machine and see if they are trying to make lateral movement (connecting to other machines) in an easier way
upvoted 3 times
...
monzie
2 years, 3 months ago
Selected Answer: C
C. Memdump. A memory dump (memdump) can provide a wealth of information about a system, including active processes, services, network connections, open files, registry keys, and more. With this information, a penetration tester can identify additional targets to compromise and pivot through the network. Autopsy is a forensics tool used to analyze disk images. Cuckoo is a malware sandboxing platform. Nmap is a network scanning tool. While these tools can be useful for various tasks, they are not as helpful as a memdump for network lateral movement.
upvoted 2 times
NerdAlert
2 years, 3 months ago
a memdump would be more helpful for identifying suspicious processes, but with nmap you can scan for what connections are opening on the other machine and see if they are trying to make lateral movement (connecting to other machines) in an easier way
upvoted 2 times
...
hieptran
2 years, 3 months ago
No one use memdump for lateral movement when conducting a penetration test.
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...