exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 91 discussion

Actual exam question from CompTIA's SY0-601
Question #: 91
Topic #: 1
[All SY0-601 Questions]

During a recent penetration test, the tester discovers large amounts of data were exfiltrated over the course of 12 months via the internet. The penetration tester stops the test to inform the client of the findings. Which of the following should be the client's NEXT step to mitigate the issue?

  • A. Conduct a full vulnerability scan to identify possible vulnerabilities.
  • B. Perform containment on the critical servers and resources.
  • C. Review the firewall and identify the source of the active connection.
  • D. Disconnect the entire infrastructure from the internet.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 10 months ago
Selected Answer: B
Perform containment on the critical servers and resources -> Isolation or containment is the first thing to do after an incident has been discovered
upvoted 41 times
...
[Removed]
Highly Voted 2 years, 7 months ago
Selected Answer: B
If we follow Incident Response Process: 1) Preparation - hardening 2) Identification - detection 3) Containment :) 4) Eradication 5) Recovery 6) Lesson Learned So it has to be CONTAINMENT :)
upvoted 23 times
...
val4
Most Recent 1 year, 8 months ago
Passed 758>750, 5-10 Q I knew, rest of like Chinese
upvoted 3 times
Sebatian20
1 year, 8 months ago
Did you select the wrong language for your test?
upvoted 17 times
...
...
freyprey
1 year, 9 months ago
Selected Answer: A
here is a quote from CompTIA study guide. The most recent : ,, Platform as a Service Platform as a service (PaaS) provides resources somewhere between SaaS and IaaS. A typical PaaS solution would provide servers and storage network infrastructure (as per IaaS) but also provide a multi-tier web application/database platform on top. This platform could be based on Oracle or MS SQL or PHP and MySQL. Examples include Oracle Database (oracle.com/database), Microsoft Azure SQL Database (azure. microsoft.com/services/sql-database), and Google App Engine (cloud.google.com/ appengine). As distinct from SaaS though, this platform would not be configured to actually do anything. Your own developers would have to create the software (the CRM or e‑commerce application) that runs using the platform. The service provider would be responsible for the integrity and availability of the platform components, but you would be responsible for the security of the application you created on the platform. " SO reading this i think this debate is closed. The answer is SaaS although in practice things are a little more different.
upvoted 1 times
...
BigIshai
1 year, 11 months ago
Selected Answer: B
I agree on containment because the pen tester already must have conducted a vulnerability assessment and in the course of pen testing would have the details- (identification) of what system the exfiltrated data is from hence the next step is to contain.
upvoted 1 times
...
Protract8593
1 year, 11 months ago
Selected Answer: B
When the penetration tester discovers data exfiltration, the immediate concern should be to prevent further damage and limit the attacker's access. By performing containment on critical servers and resources, the client can isolate the affected systems from the rest of the network, preventing further data exfiltration and minimizing the impact of the breach.
upvoted 1 times
...
Selected Answer: B
Performing containment involves isolating or segregating the affected servers and resources to prevent further unauthorized access or data exfiltration. This can be done by disconnecting the compromised systems from the network, disabling their access to sensitive data or critical resources, or implementing network segmentation to isolate the affected parts of the infrastructure. Containment is a crucial step to prevent the ongoing exfiltration and minimize the potential impact of the breach. By limiting the attacker's ability to access or extract sensitive information, the organization can mitigate the risk of further data loss or damage.
upvoted 1 times
...
Nippilous
2 years, 3 months ago
Selected Answer: B
https://www.sciencedirect.com/topics/computer-science/containment-strategy
upvoted 2 times
...
MasterControlProgram
2 years, 3 months ago
Selected Answer: B
B. Perform containment on the critical servers and resources should be the client's NEXT step to mitigate the issue.
upvoted 2 times
...
[Removed]
2 years, 7 months ago
If we follow Incident Response Process: 1) Preparation - hardening 2) Identification - detection 3) Containment :) 4) Eradication 5) Recovery 6) Lesson Learned So it has to be CONTAINMENT :)
upvoted 3 times
...
Sarooor
2 years, 7 months ago
Selected Answer: B
Perform containment on the critical servers and resources -> Isolation or containment is the first thing to do after an incident has been discovered.
upvoted 2 times
...
Tjank
2 years, 9 months ago
Selected Answer: C
following the Incident Response process: Preparation, Identification (detection), Containment, Eradication, Recovery, Post-Incident. Pen Tester would be the Preparation phase ( constantly new vulnerabilities) Identification is needed to know which systems are affected and the extend of the containment needed. Containment is next. you use what you have identified to know if you need to segment, isolate, or even shutdown completely.
upvoted 4 times
...
Tafari
2 years, 9 months ago
Selected Answer: A
He stopped so he needs to finish so all vulnerable systems are contained
upvoted 1 times
i_bird
2 years, 9 months ago
read the question well.. it's the client that is the subject of the question, not the pen tester, and its asking for MITIGATION steps
upvoted 2 times
sujon_london
1 year, 11 months ago
I assume u got mistaken abt pentester doing test on behalf of client; so client perspective should tk initiative for containment.
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...