exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 178 discussion

Actual exam question from CompTIA's SY0-601
Question #: 178
Topic #: 1
[All SY0-601 Questions]

A security analyst is evaluating the risks of authorizing multiple security solutions to collect data from the company's cloud environment. Which of the following is an immediate consequence of these integrations?

  • A. Non-compliance with data sovereignty rules
  • B. Loss of the vendors interoperability support
  • C. Mandatory deployment of a SIEM solution
  • D. Increase in the attack surface
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 8 months ago
Selected Answer: D
Choosing D: While Non-compliance with data sovereignty rules is an implication of having multiple cloud providers at DIFFERENT countries, this is not specified in the question, besides, they are security solutions, which typically means they will not collect any kind of PII, PHI, SPI
upvoted 55 times
uday1985
8 months ago
why Attack Surface? did they mention anything about controls related to attack surface? if a VPN tunnel to access the logs in the cloud environment is established? how does this increase the attack surface? Answer A and D lacks sufficient data to determine the answer!
upvoted 1 times
...
Old_Boy_
1 year, 5 months ago
Stone face the Greatest Comptia Student that ever lived.
upvoted 20 times
H_A_79
1 year, 4 months ago
Haha funny and you are right
upvoted 2 times
...
...
i_luv_stoneface
2 years, 2 months ago
ur right daddy
upvoted 29 times
DirtyDann
1 year, 6 months ago
daddy chill
upvoted 4 times
...
...
ostralo
2 years, 6 months ago
I don't understand why this increases the attack surface.. Data has been collected by many different Security Solutions(they might have different data centers in different regions or countries)
upvoted 3 times
assfedassfinished
2 years, 1 month ago
The authorization to collect doesn't increase the attack surface. The actual collection, which is not occurring in this example, would increase the attack surface.
upvoted 2 times
...
Gino_Slim
2 years, 6 months ago
It creates more opportunity for an issue with many different solutions taking place
upvoted 3 times
...
...
...
mosher21
Highly Voted 2 years ago
Selected Answer: D
The more app/services you have, the more vulnerable you get because each app brings its own vulnerabilities.
upvoted 6 times
...
shady23
Most Recent 1 year ago
Selected Answer: D
D. Increase in the attack surface
upvoted 1 times
...
BD69
1 year, 2 months ago
I couldn't answer this question. But don't understand how implementing more security solutions would increase the attack surface. Exactly how can this happen? I picked SIEM solution, as depending on the SIEM, they can process data from multiple vendors security software into 1 place. As far as data sovereignty rules, that would only apply to the data, not security metadata, right?
upvoted 1 times
akeemcsfrancis
12 months ago
Integrating multiple security solutions often involves enabling additional interfaces, APIs, or permissions for these tools
upvoted 1 times
...
...
goodmate
1 year, 6 months ago
Answer C, "authorizing multiple security solutions to collect data from the company's cloud environment" means Mandatory deployment of a SIEM solution. Question asks the definition of SIEM.
upvoted 1 times
BigSecurityGuy
1 year, 5 months ago
I thought the same thing and reread it. It asks about the consequence of it though and not what the solution would be
upvoted 1 times
...
...
Afel_Null
1 year, 7 months ago
Selected Answer: D
Data sovereignty is actually about data coming from other cultures (like asia vs europe), not about different companies/vendors, so the only fitting answer is D.
upvoted 1 times
...
MyBJ
1 year, 9 months ago
The word "IMMEDIATE" is key. I think the correct answer is A.
upvoted 3 times
...
ApplebeesWaiter1122
1 year, 9 months ago
Selected Answer: D
Integrating multiple security solutions into a company's cloud environment can lead to an increase in the attack surface. Each additional integration introduces potential entry points and potential vulnerabilities that attackers could exploit to gain unauthorized access to the cloud environment or compromise the security solutions themselves. It's crucial for the security analyst to carefully assess the risks and ensure that proper security controls are in place to mitigate the increased attack surface caused by these integrations.
upvoted 6 times
BD69
1 year, 2 months ago
How so? Security systems don't open ports, they scan for them. Would this be for the management tools, perhaps (I suppose web based tools would increase the attack surface)?
upvoted 1 times
...
...
assfedassfinished
2 years, 1 month ago
Selected Answer: A
I am going with A, because it is asking for an immediate consequence of the integration of the authorization of multiple security solutions to collect data from the company's cloud environment. If it was the integration of collection of data from the company's cloud environment by multiple security solutions, then the answer would be regarding the attack surface.
upvoted 2 times
...
Action
2 years, 2 months ago
Selected Answer: C
I’ll go with C on this one…
upvoted 1 times
...
viksap
2 years, 4 months ago
Selected Answer: A
Thinking of laws and regulations related to PII or PHI or may be GDPR but not sure
upvoted 1 times
...
FMMIR
2 years, 4 months ago
Selected Answer: D
The immediate consequence of authorizing multiple security solutions to collect data from a company's cloud environment is an increase in the attack surface. This is because each security solution that is authorized to collect data from the company's cloud environment adds another potential entry point for attackers to exploit. This can make it more difficult to secure the cloud environment and can increase the risk of a successful cyberattack.
upvoted 4 times
...
HL2020
2 years, 5 months ago
Selected Answer: A
I'm not sure how this isn't A. You are letting other companies get to your data, this would pertain to data regulations.
upvoted 3 times
gladtam
2 years, 1 month ago
That was my answer as well
upvoted 1 times
...
...
BluEric
2 years, 5 months ago
Selected Answer: A
Since this is the company's cloud environment, it is likely a private cloud. Allowing others to access that data would mean they will have to follow the data regulations, including GDPR, for example. So I am going with A, although this is a very annoying question.
upvoted 1 times
rhocale
2 years, 4 months ago
this happens all the time its not any kind of a compliance issue and it never says it leaves the united states or where it (the main cloud company) or the other businesses are if you are just looking at the question without taking it any further the answer must be D
upvoted 3 times
...
...
Sony12
2 years, 6 months ago
Answer is C. Mandatory deployment of a SIEM solution to Log all relevant events and filter irrelevant data in one place.
upvoted 2 times
...
J_Ark1
2 years, 6 months ago
slows down the system and opens it up to vulnerabilities i think
upvoted 1 times
...
Ashbash95
2 years, 6 months ago
Selected Answer: C
Answer is C
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago