exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 128 discussion

Actual exam question from CompTIA's SY0-601
Question #: 128
Topic #: 1
[All SY0-601 Questions]

A help desk technician receives a phone call from someone claiming to be a part of the organization's cybersecurity incident response team. The caller asks the technician to verify the network's internal firewall IP Address. Which of the following is the technician's BEST course of action?

  • A. Direct the caller to stop by the help desk in person and hang up declining any further requests from the caller.
  • B. Ask for the caller's name, verify the person's identity in the email directory, and provide the requested information over the phone.
  • C. Write down the phone number of the caller if possible, the name of the person requesting the information, hang up, and notify the organization's cybersecurity officer.
  • D. Request the caller send an email for identity verification and provide the requested information via email to the caller.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
rodwave
Highly Voted 2 years, 7 months ago
Selected Answer: C
Answer: Write down the phone number of the caller if possible, the name of the person requesting the information, hang up, and notify the organization's cybersecurity officer. In this scenario, the help desk technician should be wary of the person's request as help desk technicians would not have this information. Also, if the person claimed to be from the cybersecurity incident response team, they would more likely to have access to this information anyway, or at least know who to contact. For the sake of the technician, it would be best to get as much information as possible and delegate the task of confirming the person's identity to the cybersecurity officer. Even in the very slim chance that it was a legitimate request, it would still be best for the cyber security officer to provide this information instead of a tech.
upvoted 28 times
...
stoneface
Highly Voted 2 years, 9 months ago
Selected Answer: D
D->Request the caller send an email for identity verification and provide the requested information via email to the caller. -> This will allow to have a record of the requested information as well as identifying the requester.
upvoted 23 times
Ruthless937
1 year, 9 months ago
if the attacker has spoofed the email address then they could bypass the email identity verification.
upvoted 7 times
Ruthless937
1 year, 9 months ago
also you would never send an internal IP like that over email for anyone to read.
upvoted 7 times
...
...
varun0
2 years, 9 months ago
Emails can easily be spoofed, C seems to be the best option.
upvoted 7 times
VendorPTS
2 years, 8 months ago
Also, as it didn't say the email was encrypted, the email is potentially subject to monitoring/analysis, and you don't really want to put that out there without securing it. C seems best with these choices.
upvoted 3 times
...
...
J_Ark1
2 years, 7 months ago
The issue is that a random individual is trying to gain acess to the internal network and hence we do not know their intended purpose, so it makes sense to notify the cyber security officer so that they can confirm their authorisation via the right channels of communication.
upvoted 3 times
...
J_Ark1
2 years, 7 months ago
For the SIEM systems to be able to know who it was that attacked and compromised the system?
upvoted 1 times
...
...
BD69
Most Recent 1 year, 3 months ago
C is the best answer. Using email to verify identity is a terrible idea!
upvoted 2 times
...
klinkklonk
1 year, 5 months ago
Selected Answer: C
Emails can be spoofed.
upvoted 3 times
...
cyberPunk28
1 year, 6 months ago
Selected Answer: D
From working experience any type of request like this has to be requested in writing via email D. Request the caller send an email for identity verification and provide the requested information via email to the caller.
upvoted 1 times
BD69
1 year, 3 months ago
"provide the requested information via email to the caller" - wow! That's the part of answer D that should shoot red flags all over the place! Horrible advice sending ANY kind of security info via email. Just because your particular email server and the connection to it is encrypted, does not protect you from any of the servers relaying that info.
upvoted 1 times
...
...
TheFivePips
1 year, 7 months ago
Selected Answer: C
Why on earth would a member of the response team ask a help desk person to give them an IP? They would be much more likely to have that information on hand
upvoted 2 times
...
Mahoni
1 year, 7 months ago
C-> Can you imagine a real CSIRT calling helpdesk asking for the firewall IP address? Better get all the info you can get from them and pass it to the security team. Make sure you don't give them any more info such as your email other phone numbers etc.
upvoted 4 times
...
ComPCertOn
1 year, 7 months ago
Selected Answer: C
never give any information over the phone, Inform the Cyber team
upvoted 5 times
...
Arishutara
1 year, 7 months ago
"I must express my disappointment with the cybersecurity community's response to the recent question. It appears that the answer provided was incorrect, which can be frustrating when seeking accurate information in this critical field."
upvoted 2 times
...
Only12go
1 year, 8 months ago
Selected Answer: C
Look up MGM hack = Answer is C
upvoted 2 times
...
malibi
1 year, 9 months ago
Selected Answer: D
emailing a helpdesk is like creating a helpdesk ticket. 1. email add of the sender will be verified, 2. the request will go on the proper channel!. just my 2 cents
upvoted 1 times
...
ja1092m
1 year, 10 months ago
It asked for the BEST course of action, wouldn't C be the most secure?
upvoted 1 times
...
RevolutionaryAct
1 year, 10 months ago
Selected Answer: C
D doesn't make sense given the firewall is supposedly compromised, why would you send data in the clear over email when the firewall is in question? It's C
upvoted 2 times
...
predsednik
1 year, 10 months ago
Selected Answer: C
I would go with C because in case someone is trying to scam help desk tech claiming that he belongs to cyber security team, then help desk tech should check and verify this information with Cybersec team if that person exists in their team and does he need that information. In case you decide for D and send requested info to sender without verifying his identity with the cyber sec team you could be wrong and send sensitive information to the hacker who maybe stole email credentials from the real guy.
upvoted 1 times
...
ApplebeesWaiter1122
1 year, 10 months ago
Selected Answer: C
In this situation, the technician should be cautious and follow proper security protocols. The caller's request to verify the network's internal firewall IP address is sensitive information that should not be disclosed over the phone without proper verification. Instead, the technician should gather as much information as possible about the caller, including their name and phone number, and then hang up the call. The next step is to notify the organization's cybersecurity officer or a designated authority about the incident so they can verify the legitimacy of the request and take appropriate actions if necessary.
upvoted 1 times
...
Protract8593
1 year, 10 months ago
Selected Answer: C
In this scenario, the help desk technician receives a call from someone claiming to be from the organization's cybersecurity incident response team. It is essential to follow proper security protocols and procedures when dealing with sensitive information or requests for verification. Option A (Direct the caller to stop by the help desk in person and hang up declining any further requests from the caller) is a good approach if the person is genuinely from the incident response team. However, it may not be feasible or practical in all situations, especially if the organization has a distributed workforce or remote teams. Option B (Ask for the caller's name, verify the person's identity in the email directory, and provide the requested information over the phone) is not recommended because verifying the person's identity solely based on the email directory may not be enough to ensure their authenticity.
upvoted 2 times
Protract8593
1 year, 10 months ago
Option D (Request the caller send an email for identity verification and provide the requested information via email to the caller) is also not the best course of action, as responding to unsolicited emails can lead to phishing or other security risks. The best approach is to gather as much information as possible from the caller (name, phone number, purpose of the request) without divulging sensitive information. After hanging up, the technician should notify the organization's cybersecurity officer or the appropriate security personnel to verify the legitimacy of the request before taking any further action.
upvoted 4 times
...
...
Jonsmith24
1 year, 10 months ago
What if he is part of the organization's cybersecurity incident response team, and has the proper identity information? Why are you calling the cyber security officer before you even seen the identification?
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...