exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 82 discussion

Actual exam question from CompTIA's SY0-601
Question #: 82
Topic #: 1
[All SY0-601 Questions]

Multiple business accounts were compromised a few days after a public website had its credentials database leaked on the Internet. No business emails were identified in the breach, but the security team thinks that the list of passwords exposed was later used to compromise business accounts. Which of the following would mitigate the issue?

  • A. Complexity requirements
  • B. Password history
  • C. Acceptable use policy
  • D. Shared accounts
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
antster1000
Highly Voted 2 years, 10 months ago
Don't really feel like any of the answers are sufficient. Would be looking for something like MFA for this.
upvoted 57 times
CTE_Instructor
2 years, 3 months ago
Yeah. A few days after the breach, the passwords were a vulnerability? Password history would not be realistic for this scenario. If it said 7 months later, that would make more sense. Imagine having a 24-hour password policy :cry:
upvoted 13 times
...
...
stoneface
Highly Voted 2 years, 10 months ago
Selected Answer: B
Password reuse is an important concern in any organization. Many users want to reuse the same password for their account over a long period of time.
upvoted 27 times
stonefacegroupie
2 years, 2 months ago
I concur
upvoted 3 times
...
kigikik881
1 year, 9 months ago
It doesn't make sense. It's known fact, that users use the same password changing the last one-two digits to comply with "pasword history" requirement. Password complexity helps to preserve policies, at least. I believe, here no good option. Idk why they ask to choose better from worst.
upvoted 5 times
...
...
shady23
Most Recent 1 year, 2 months ago
Selected Answer: B
B. Password history
upvoted 1 times
...
toffer96
1 year, 2 months ago
First, antster1000 is right, but my take is this: when the questions asks "Which of the following would mitigate the issue?", isn't it suggested that means how do we prevent this from happening in the first place? In which case I would lean towards C. So... A - definitely important, but the questions suggests that passwords were compromised anyway. Same for B.
upvoted 1 times
...
gr23
1 year, 4 months ago
B. Password history This would keep accounts secure as past passwords, which are now public, would be useless.
upvoted 1 times
...
testnickname01
1 year, 4 months ago
Selected Answer: B
Password History is the best answer. The password history policy prevents users from reusing their old passwords (because their old passwords are found in the leaked password list.)
upvoted 2 times
...
cyberPunk28
1 year, 6 months ago
Selected Answer: B
B. Password history
upvoted 1 times
...
Oruga88
1 year, 8 months ago
Selected Answer: A
Correct Answer: A. Complexity requirements, Because having stronger and more complex passwords makes it harder for attackers to use leaked passwords from other breaches to compromise accounts. If users have complex passwords that are unique to each service they use, the likelihood of a password from one service being valid on another is reduced. Other Answer: B. Password history, This ensures users don't reuse recent passwords, but it wouldn't necessarily prevent the use of passwords from an external leak if a user used the same password on multiple platforms. C. Acceptable use policy, While this sets guidelines for how IT resources can be used, it doesn't directly address the password reuse issue. D. Shared accounts, Shared accounts typically present more of a security risk rather than mitigating issues, as multiple individuals have access to the same account and it's harder to track individual actions.
upvoted 1 times
klinkklonk
1 year, 5 months ago
Isn't the issue that a password used at the company by staff was also being used on personal accounts? Therefore password history would force them to change the password at the company, which would then be different to any leaked passwords?
upvoted 1 times
...
...
Josh1978
1 year, 8 months ago
Answers for the exam and answers that make since in the real world aren't always the same. Once I pass I'm memory dumping all this BS.
upvoted 8 times
klinkklonk
1 year, 5 months ago
Yeah, it's disheartening with how much effort we put into studying and then there are so many of these poorly worded questions. Even cybersecurity professionals struggle with these questions.
upvoted 1 times
...
...
MortG7
1 year, 8 months ago
All of the choices are crap...not sure if this question is reflective of the real world, or has any value. They are more concerned with tricking with words rather than validating you knowledge. What clown is authoring these questions?
upvoted 6 times
Atlstorageguy
1 year, 3 months ago
Dude, I was telling my friend the exact same thing today. Every question is worded in a way that more than one answer is correct and depending on who wrote the question the answer changes. Everything is a trick question instead of testing for basic knowledge
upvoted 1 times
...
saucehozz
1 year, 6 months ago
The receptionist
upvoted 1 times
MortG7
1 year, 5 months ago
They must have one funny looking receptionist.
upvoted 1 times
...
...
...
Fiftypeso
1 year, 9 months ago
I don't understand these questions, i starting to understand the comments about these questions. Should mitigate the problem right now be have them all change their passwords.... history doesn't matter if there is no age? If they have the database of passwords then they are running a rainbow attack on it somewhere and going to just get more passwords if no one changes it? force a password change, add age and history...
upvoted 1 times
awscody
1 year, 9 months ago
These answers are in fact bad but password history would be ideal out of all of them. A better choice would be password age.
upvoted 1 times
...
...
assfedassfinished
1 year, 9 months ago
Selected Answer: B
Password history is the least bad of these bad answers.
upvoted 8 times
...
Kraken84
1 year, 10 months ago
"... was later used" is a our key statement here.
upvoted 2 times
...
BigIshai
1 year, 11 months ago
Selected Answer: C
The scenario indicates business accounts have been compromised in an aftermath of a non-related security incident. Meaning the malicious actors got information from the leaked information and used the same on corporate accounts which evidently also got compromised because the end-users must have reused passwords. Hence an acceptable policy against password reuse would have mitigated the secondary incident. (logic appears sound but open to debate)
upvoted 5 times
...
Protract8593
1 year, 11 months ago
Selected Answer: B
Implementing password history would be an effective measure to mitigate the issue of compromised business accounts in this scenario. Password history keeps track of previously used passwords, and users are not allowed to reuse old passwords when creating a new one. This prevents attackers from reusing leaked passwords to gain unauthorized access to business accounts, even if the leaked credentials are known to them. By enforcing password history, organizations can improve their security posture and protect against credential reuse attacks.
upvoted 2 times
...
LiteralGod
1 year, 11 months ago
Selected Answer: B
I think given the information we have it would be password history.
upvoted 1 times
...
ApplebeesWaiter1122
1 year, 12 months ago
Selected Answer: B
Password history: Implementing a password history policy ensures that users cannot reuse their previously used passwords. This prevents attackers from reusing compromised passwords to gain unauthorized access to business accounts. By maintaining a password history, users are forced to choose unique passwords each time they update their credentials.
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...