exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 61 discussion

Actual exam question from CompTIA's SY0-601
Question #: 61
Topic #: 1
[All SY0-601 Questions]

Data exfiltration analysis indicates that an attacker managed to download system configuration notes from a web server. The web-server logs have been deleted, but analysts have determined that the system configuration notes were stored in the database administrator's folder on the web server. Which of the following attacks explains what occurred? (Choose two.)

  • A. Pass-the-hash
  • B. Directory traversal
  • C. SQL injection
  • D. Privilege escalation
  • E. Cross-site scripting
  • F. Request forgery
Show Suggested Answer Hide Answer
Suggested Answer: BD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
rodwave
Highly Voted 2 years, 6 months ago
Selected Answer: BD
Answer: B. Directory traversal & D. Privilege escalation Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory other than the server's root directory. If the attempt is successful, the threat actor can view restricted files or execute commands on the server. Privilege escalation is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.
upvoted 26 times
...
carpathia
Highly Voted 2 years, 6 months ago
Selected Answer: BD
"admin's folder" - Priv escalation, + dir transversal. "database" is thrown in as a decoy for SQL answer.
upvoted 21 times
LO353
1 year, 8 months ago
database admin folder caught me out ,
upvoted 3 times
...
...
dfc6822
Most Recent 1 year, 4 months ago
BC is the correct answer
upvoted 1 times
...
B3hindCl0sedD00rs
1 year, 4 months ago
Selected Answer: BD
Anyone who has been a Windows Server Admin for years knows this is B&D.
upvoted 1 times
...
cyberPunk28
1 year, 5 months ago
Selected Answer: BD
B. Directory traversal& D. Privilege escalation
upvoted 1 times
...
Fiftypeso
1 year, 8 months ago
Selected Answer: AD
Can someone explain how B and D got the culprit in? Why isn't pass-the hash in there via the web server and then privilege escalation would get him into the DB's directory if it wasn't his has and also allow for the deletion of the logs.... I think I'm totally missing something.... the culprit would need the user name with the pass the hash?
upvoted 1 times
daddylonglegs
1 year, 7 months ago
A few reasons, mainly being that pass-the-hash attacks are not really applicable when authenticating to web servers. Pass-the-hash is mainly in the context with authenticating to directory services.
upvoted 1 times
...
Fiftypeso
1 year, 8 months ago
--maybe SQLi and then the privilege escalation, I'm so stuck on how they got in to escalate the privilege
upvoted 1 times
...
...
Protract8593
1 year, 10 months ago
Selected Answer: BD
1. Directory traversal: In a directory traversal attack, the attacker exploits improper input validation to access files and directories that are outside the intended directory. In this scenario, the attacker used directory traversal to access the database administrator's folder on the web server and download the system configuration notes. 2. Privilege escalation: Privilege escalation involves gaining higher-level privileges on a system to access resources or perform actions beyond the intended scope. In this case, the attacker likely escalated their privileges to gain access to the database administrator's folder and retrieve the system configuration notes.
upvoted 1 times
...
monzie
2 years, 2 months ago
Selected Answer: BC
The two attacks that could explain what occurred are: B. Directory traversal: This attack involves using a specially crafted input to access files or directories that are outside of the intended directory structure. In this scenario, it is possible that the attacker used a directory traversal attack to access the database administrator's folder on the web server and retrieve the system configuration notes. C. SQL injection: This attack involves injecting malicious SQL code into an application's input field, which can then be used to access or modify sensitive data in a database. It is possible that the attacker used a SQL injection attack to access the database administrator's folder on the web server and retrieve the system configuration notes.
upvoted 5 times
...
MasterControlProgram
2 years, 2 months ago
Selected Answer: BD
The two attacks that explain the scenario are: B. Directory traversal: Directory traversal is an attack in which an attacker can access files and directories that are stored outside the web root folder by manipulating a web application's input parameters, such as file paths or directory names. In this case, the attacker was able to access the system configuration notes by traversing to the database administrator's folder on the web server. D. Privilege escalation: Privilege escalation is an attack in which an attacker gains elevated privileges to a system or network by exploiting a vulnerability or weakness. In this case, the attacker was able to access the database administrator's folder on the web server, which suggests that they may have escalated privileges to gain access to that folder.
upvoted 1 times
...
cutemantoes
2 years, 3 months ago
Selected Answer: BC
Yes B and D sound correct. However, just because they accessed the notes from an admins folder still doesnt mean that a privilege escalation occurred. It does say that it was on the databases admin folder, making it seem as theres a database. Im on the fence between B and D, and B and C.
upvoted 5 times
daddylonglegs
1 year, 7 months ago
There being a database admin does imply there is a database but that was not mentioned as part of the attack. All the question mentions is that the config files were stored in the DBAdmin's folder. No mention or indication of anything to do with sql injection. Best answer is BD
upvoted 3 times
...
LeDarius3762
1 year, 10 months ago
I'll choose B and D because priviledge escalation is related to lateral movement in which a cyberattacker moves deeper into a network in search of high-value assets. In this case, the system configuration notes in the database administrator's folder
upvoted 3 times
...
...
G4ct756
2 years, 7 months ago
Selected Answer: CD
C & D, - c, the admin notes are stored in "the database", Will require SQLi to interact with DB. - d, need privilege to clear the system logs.
upvoted 2 times
hieptran
2 years, 4 months ago
Read the question carefully. It clearly stated: "database administrator's folder". It has nothing to do with SQL injection.
upvoted 2 times
...
...
j0n45
2 years, 8 months ago
Selected Answer: BD
Directory traversal and Privilege escalation.
upvoted 5 times
...
FT1
2 years, 9 months ago
B&D The simplest example of a directory traversal attack is when an application displays or allows the user to download a file via a URL parameter.
upvoted 4 times
...
Wiggie
2 years, 9 months ago
Selected Answer: BC
B and C
upvoted 1 times
Wiggie
2 years, 9 months ago
Correction, B and D
upvoted 2 times
...
...
varun0
2 years, 9 months ago
Selected Answer: BD
B & D seem to be correct.
upvoted 3 times
varun0
2 years, 9 months ago
Also don't assume just because there's a db admin there'd be a database. DB or web application interface (XSS) is not a requirement for a web server, don't assume there is one.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...