exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 117 discussion

Actual exam question from CompTIA's SY0-601
Question #: 117
Topic #: 1
[All SY0-601 Questions]

An employee received a word processing file that was delivered as an email attachment. The subject line and email content enticed the employee to open the attachment. Which of the following attack vectors BEST matches this malware?

  • A. Embedded Python code
  • B. Macro-enabled file
  • C. Bash scripting
  • D. Credential-harvesting website
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
IQ30
Highly Voted 2 years, 10 months ago
Jason Dion notes: Macro o Virus embedded into a document and is executed when the document is opened by the user
upvoted 25 times
...
rodwave
Highly Voted 2 years, 7 months ago
Selected Answer: B
Answer: Macro-enabled file Phishing emails with a word document attachment typically will have macros that can be ran for malicious purposes. Macros are scripts that can run whatever you want and however many times you want it to run, it's generally used for automating frequently used tasks. Since macros can practically do whatever you want, they can be used for malicious purposes such as infecting other files, or downloading/installing other malicious software. Macros would normally run as soon as the document is opened but now macros are disabled in Office apps by default so you would need to manually enable marcos on the file for them to run.
upvoted 13 times
...
klinkklonk
Most Recent 1 year, 5 months ago
Selected Answer: B
Malicious Macro Document which is associated with Microsoft Word.
upvoted 1 times
...
Protract8593
1 year, 11 months ago
Selected Answer: B
A macro-enabled file is a type of document (such as a word processing file) that contains embedded macros, which are scripts or programs that can be executed to automate tasks within the document. In the context of this question, the employee received a word processing file as an email attachment, and the subject line and email content enticed the employee to open the attachment. This is a common tactic used in phishing attacks, where attackers send malicious files with enticing content to trick users into opening them, thereby executing the embedded macros, which may deliver malware or perform other malicious actions.
upvoted 4 times
...
ApplebeesWaiter1122
1 year, 11 months ago
Selected Answer: B
In this scenario, the most likely attack vector is a macro-enabled file. Macro-enabled files are commonly used in phishing attacks. The email attachment appears to be a harmless document (e.g., Word, Excel), but it contains embedded macros. When the user opens the file and enables the macros as prompted, the malicious code within the macros gets executed, potentially leading to the installation of malware or other harmful activities on the user's system. This type of attack takes advantage of users' curiosity or interest in the content of the email to trick them into executing the malicious code.
upvoted 1 times
...
samwin111
2 years, 8 months ago
Selected Answer: B
Python will not run on doc files Macro runs on doc files
upvoted 3 times
...
comeragh
2 years, 9 months ago
Selected Answer: B
B - correct answer here
upvoted 2 times
Sublime_Cheese
1 year, 9 months ago
valid point
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...