exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 101 discussion

Actual exam question from CompTIA's SY0-601
Question #: 101
Topic #: 1
[All SY0-601 Questions]

A DBA reports that several production server hard drives were wiped over the weekend. The DBA also reports that several Linux servers were unavailable due to system files being deleted unexpectedly. A security analyst verified that software was configured to delete data deliberately from those servers. No backdoors to any servers were found. Which of the following attacks was MOST likely used to cause the data loss?

  • A. Logic bomb
  • B. Ransomware
  • C. Fileless virus
  • D. Remote access Trojans
  • E. Rootkit
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 8 months ago
Selected Answer: A
"software was configured to delete data deliberately from those servers" This could be achieved by a cronjob
upvoted 30 times
...
Nirmalabhi
Highly Voted 2 years, 5 months ago
its a trap.I also first thought it was rootkit. but i ll go with logic bomb. Although no conditions specified, Q says it happened over weekend which means the software was configured to delete data automatically over the weekend.
upvoted 5 times
NerdAlert
2 years, 2 months ago
I thought so too, but then I noticed "no backdoors were found" - rootkits are usually a type of backdoor
upvoted 1 times
...
...
Ant0507
Most Recent 1 year, 6 months ago
Question, the Comptia exam is only 90 or so questions, is everyone going through all 700 questions on here?
upvoted 4 times
Salsa12
1 year ago
There are 90 questions on the Sec+ it doesn't mean the first 90 questions on here will be on your test. I believe it grabs questions from the pool of 700 questions available.
upvoted 1 times
...
ProCoder101
1 year, 2 months ago
No, I am going through whichever is free without getting contributor access.
upvoted 1 times
...
Billyon
1 year, 6 months ago
Yes i am
upvoted 12 times
...
...
guestionme
1 year, 8 months ago
Rootkit seems right to me because the question says "system files being deleted." Does anyone know the actual answer?
upvoted 1 times
MuttleyB
1 year, 5 months ago
Logic bomb. On a linux server, you don't need a rootkit to delete system files. Theoretically, just sudo in and you can wipe your entire kernel like that. Practically, most distributions have protections that keep you from doing that, but it's not as difficult to accomplish as Windows.
upvoted 3 times
...
...
Protract8593
1 year, 10 months ago
Selected Answer: A
A logic bomb is a type of malicious code or software that is intentionally inserted into a system and designed to execute a specific malicious action when certain conditions are met. In this scenario, the logic bomb was deliberately configured to delete data from the production server hard drives and Linux servers unexpectedly. It is important to note that logic bombs can be triggered by various conditions such as a specific date, time, or event, and they are intended to cause harm or damage to the targeted system or data.
upvoted 4 times
...
ApplebeesWaiter1122
1 year, 10 months ago
Selected Answer: A
A logic bomb is a type of malicious code or script that is intentionally inserted into a system with the purpose of executing a harmful action at a specific time or when specific conditions are met. In this scenario, the deliberate deletion of data from the production server hard drives and the unexpected deletion of system files on the Linux servers indicate the presence of a logic bomb.
upvoted 2 times
...
MasterControlProgram
2 years, 2 months ago
Selected Answer: A
The most likely attack used to cause the data loss is a "Logic bomb" attack. A logic bomb is a type of malicious code that is intentionally inserted into a software program or system with the intention of causing damage or destruction at a specific time or under specific conditions, such as a particular date or event. In this case, the fact that the software was configured to delete data deliberately from the servers indicates that a logic bomb may have been used to trigger the deletion.
upvoted 1 times
...
Mismomano
2 years, 3 months ago
Selected Answer: E
A rootkit allows someone to maintain command and control over a computer without the computer user/owner knowing about it. Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine.
upvoted 1 times
Boulet_Dude
2 years, 2 months ago
Wouldn’t a root kit create a back door?
upvoted 11 times
TheFivePips
1 year, 6 months ago
chat gpt says: Yes, a rootkit typically creates a backdoor or a hidden and unauthorized access point into a compromised system. Rootkits are a form of malicious software designed to conceal their presence on a system while granting an attacker privileged access and control over the compromised system. This hidden access often functions as a backdoor, allowing the attacker to maintain control over the system, execute malicious actions, and potentially exfiltrate data or perform other unauthorized activities. While rootkits are known for their stealth and ability to hide their presence from system administrators and security tools, they are primarily used to establish a secret means of control, which is effectively a backdoor into the compromised system. This backdoor access is what distinguishes rootkits from other types of malware.
upvoted 1 times
...
...
...
DALLASCOWBOYS
2 years, 3 months ago
A. Logic bomb would suggest software was configured to be deleted data deliberately from the servers.
upvoted 3 times
...
Conejo_Negro
2 years, 5 months ago
Selected Answer: C
I believe the answer is C Fileless virus. Rootkits usually require a back door..question states no back door found..there no pattern or condition stated in the question..the “software was configured to delete data from those servers “ Fileless attacks usually attaches itself to legitimate software. https://www.trellix.com/en-us/security-awareness/ransomware/what-is-fileless-malware.html
upvoted 3 times
Sandon
2 years, 4 months ago
That ain't it
upvoted 3 times
...
Confuzed
2 years, 1 month ago
A fileless virus resides in memory... they wouldn't be able to say "software was configured" if it were a running process that did this. Software on the system was configured to do this, we can assume that it doesn't just keep doing this constantly, so it must have a trigger (time, event, etc), a trigger is logic. So it's a logic bomb.
upvoted 2 times
...
...
[Removed]
2 years, 5 months ago
Selected Answer: E
I also sway to the ROOTKIT. "no BACKDOOR was found" <---- rootkit hides its presence that why no backdoor was found. The term ROOTKIT derives from UNIX/Linux where any process running as root has unrestricted access to everything from the root of the file system down.
upvoted 1 times
Sandon
2 years, 4 months ago
That ain't it
upvoted 1 times
...
NerdAlert
2 years, 2 months ago
rootkits are usually a type of backdoor
upvoted 2 times
...
...
Jossie_C
2 years, 6 months ago
Key word is deliberately, i.e., intentionally. It's a trap
upvoted 1 times
...
EDSAL
2 years, 8 months ago
A Logic bomb
upvoted 1 times
...
gen2dee
2 years, 8 months ago
"software was configured"
upvoted 2 times
...
WondaByte
2 years, 8 months ago
Correct Answer E Rootkit fits the answer to the question. A condition has to be true for Logic Bomb to occur which in this case isn't there. Correct Answer E
upvoted 3 times
Halaa
2 years, 8 months ago
But no BACKDOOR was found.
upvoted 4 times
...
Gino_Slim
2 years, 7 months ago
Hey everyone, this is NOT the right answer.
upvoted 2 times
...
Orean
2 years, 6 months ago
The condition could be time-based, meaning the logic bomb might have been set to activate at a specified date and time—such as the weekend of the data wipe.
upvoted 3 times
...
...
Boogie_79
2 years, 8 months ago
Selected Answer: A
Its simply LOGIC
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...