exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 160 discussion

Actual exam question from CompTIA's SY0-601
Question #: 160
Topic #: 1
[All SY0-601 Questions]

Which of the following would be the BEST way to analyze diskless malware that has infected a VDI?

  • A. Shut down the VDI and copy off the event logs.
  • B. Take a memory snapshot of the running system.
  • C. Use NetFlow to identify command-and-control IPs.
  • D. Run a full on-demand scan of the root volume.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 8 months ago
Selected Answer: B
Take a snapshot of the VDI would allow to both analyze and temporary isolate the threat as we can then shut it down to proceed to futher analyze the snapshot
upvoted 38 times
...
Protract8593
Highly Voted 1 year, 9 months ago
Selected Answer: B
The BEST way to analyze diskless malware that has infected a Virtual Desktop Infrastructure (VDI) is to take a memory snapshot of the running system. Memory analysis is a crucial step in malware analysis as it allows security analysts to examine the malware's behavior and activities within the volatile memory space. This method can provide valuable insights into the malware's execution, processes, network connections, and any artifacts left in memory. Options A, C, and D are not as effective or appropriate for analyzing diskless malware on a VDI. Shutting down the VDI and copying off event logs (Option A) may not be sufficient to capture the transient behavior of the malware in memory. Using NetFlow to identify command-and-control IPs (Option C) might be helpful for network analysis but does not specifically focus on the malware running in memory. Running a full on-demand scan of the root volume (Option D) is more suited to traditional disk-based systems and may not be as effective in analyzing diskless malware in a VDI environment.
upvoted 6 times
...
sujon_london
Most Recent 1 year, 9 months ago
Selected Answer: B
Option B and C both are literally right for analyzing disk less malware. As question asked Best way in that sense B would be best fit.
upvoted 1 times
...
ronniehaang
2 years, 3 months ago
Selected Answer: B
B. Take a memory snapshot of the running system. To analyze diskless malware that has infected a Virtual Desktop Infrastructure (VDI), it would be best to take a memory snapshot of the running system. The malware, as diskless, is likely to exist only in memory, not on disk. A memory snapshot captures the state of the system's memory at a specific point in time and can be analyzed offline, allowing the security analyst to identify and analyze the malware without risking further spread. The memory snapshot can be used to analyze the running processes, loaded modules, and other system activity to determine the source and nature of the malware.
upvoted 3 times
...
FMMIR
2 years, 4 months ago
Selected Answer: B
The best way to analyze diskless malware that has infected a VDI would be to take a memory snapshot of the running system. This would capture the state of the system's memory at the time the snapshot was taken, including any malware that may be present in memory. This would allow analysts to examine the malware without running the risk of infecting other systems or allowing the malware to continue operating. Additionally, taking a memory snapshot would allow analysts to examine the malware without shutting down the VDI, which could disrupt other users and potentially cause data loss. Using NetFlow to identify command-and-control IPs and running a full on-demand scan of the root volume would not be as effective in analyzing diskless malware, as they would not provide direct access to the malware itself. Copying off the event logs would also not be as effective, as they may not contain detailed information about the malware.
upvoted 1 times
...
lucasvs_
2 years, 8 months ago
Selected Answer: B
ake a snapshot of the VDI would allow to both analyze and temporary isolate the threat as we can then shut it down to proceed to futher analyze the snapshot
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago