exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 163 discussion

Actual exam question from CompTIA's CS0-002
Question #: 163
Topic #: 1
[All CS0-002 Questions]

An organization's internal department frequently uses a cloud provider to store large amounts of sensitive data. A threat actor has deployed a virtual machine to attack another virtual machine to gain access to the data. Through the use of the cloud host's hypervisor, the threat actor has escalated the access rights. Which of the following actions would be BEST to remediate the vulnerability the attacker has used to exploit the system?

  • A. Sandbox the virtual machine.
  • B. Implement an MFA solution.
  • C. Update to the secure hypervisor version.
  • D. Implement dedicated hardware for each customer.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
novolyus
1 year, 5 months ago
Selected Answer: C
Cloud provider providing storage (IaaS). You cannot update the hypervisor but can configure MFA to access your infrastructure.
upvoted 2 times
...
Gwatto
1 year, 5 months ago
I'm confused at why so many people are choosing C, no where in the question stated the hyperV was outdated .
upvoted 1 times
...
Pavel019846457
1 year, 5 months ago
Selected Answer: C
Hypervisor is vulnerable if "A threat actor has deployed a virtual machine to attack another virtual machine". VM escape.
upvoted 2 times
...
heinzelrumpel
1 year, 9 months ago
Selected Answer: C
C because it is asking to remidiate the ongoing situation, not future plans to do it better or to lower te risk from the beginning. Whoever is suggesting for MFA please reconsider your profession ;-)
upvoted 2 times
novolyus
1 year, 5 months ago
Reconsider taking an english course so you could understand the question.
upvoted 1 times
...
uday1985
1 year, 7 months ago
And what do you do for living? hard-core Security ANalyst? how new vulnerabilities can be addressed? isn't MFA used to authorize access to these servers? and connection wont be allowed until its authenticated. I will re-consider my career since the majority that start studying CS! have no background and knowledge to justify their answers!
upvoted 4 times
...
...
POWNED
1 year, 9 months ago
Selected Answer: C
Thank god one person mentioned VM escape. The only way you are going to be able to hack into additional VM's is through VM escape which involves manipulating the hypervisor. The answer is C
upvoted 4 times
...
sus1801
2 years ago
The question says "A threat actor has deployed a virtual machine to attack another virtual machine to gain access to the data" So option A and C is out of the way, as the vulnerability is in the cloud provider not the hypervisor, Option D could be a choice but that seems like a costly option, that leaves only option B to be correct
upvoted 1 times
...
kiduuu
2 years ago
Selected Answer: C
The threat actor has exploited a vulnerability in the hypervisor to escalate access rights. To remediate this vulnerability, the organization should update to a secure version of the hypervisor. By doing so, the organization can ensure that the hypervisor is not vulnerable to known attacks and that access rights cannot be escalated in the same way as before. Sandboxing the virtual machine, implementing an MFA solution, or implementing dedicated hardware for each customer are not effective solutions to this particular vulnerability.
upvoted 4 times
...
Henry88
2 years, 1 month ago
Selected Answer: B
Are we all reading the same question? There was absolutely nothing in this question that said anything about an outdated hypervisor version so how would anyone know that we need to update the hypervisor version? MFA is the best option.
upvoted 3 times
2Fish
2 years, 1 month ago
This is a difficult question as we are not sure if this was an insider attack, or is the attacker using an escape attack etc. Does the attacker have priv esc to the actual hypervisor and or the running VM's on that hypervisor. If this was an escape attack then the mitigations are: Mitigation: * Proper guest OS isolation from Host OS * Updated patching for Hypervisor * Regular software patching of virtual machine operating system * Running bare minimum resource-sharing features * Installing minimum software application, as they also could have vulnerabilities
upvoted 2 times
...
...
Eric1234
2 years, 2 months ago
Selected Answer: B
Implement a MFA solution, answer is B. Only Cloud Provider has access to the host hypervisor. That is why the Adversary deployed a new VM to attack the existing VM. MFA would prevent anyone from compromising their Cloud Admin Account
upvoted 2 times
...
NickDrops
2 years, 2 months ago
Selected Answer: B
I say the answer is B. The treat actor had to access the Cloud SP in the 1st place. Good luck getting around MFA when logging into the hypervisor.
upvoted 1 times
...
catastrophie
2 years, 2 months ago
Selected Answer: B
B would most likely be the best answer for remediation in this scenario. Since nothing was specifically called out for an older software version on the hypervisor, I'll assume that it's up to date. The steps for remediation should be isolation, patches for the software version if any are available, after this you would do whatever remediation steps you could such as configuration changes, stricter access controls like MFA, then continue to monitor the system. So given the fact we don't know an accurate status of the current software version, MFA implementation would be the only guaranteed mitigation step to remediate a hypervisor vulnerability. Sandboxing VMs and dedicated hardware does not protect the system when the attacker has the capability to perform host escapes.
upvoted 2 times
...
TKW36
2 years, 3 months ago
Selected Answer: C
C. Question specifically asks "Which of the following actions would be BEST to remediate the vulnerability the attacker has used to exploit the system?" which means remediate the hypervisor vulnerability. Sandboxing a virtual machine would mean isolating it from the other systems to prevent malicious code from spreading, but it won’t address the vulnerability in the hypervisor. Implementing an MFA solution would provide an additional layer of security, but it wouldn't remediate the vulnerability. Dedicated hardware for each customer would isolate customers' data, but it wouldn't address the hypervisor vulnerabilities. Also it would be the cloud provider who updates the hypervisor, not the client, so this question is being asked by the perspective of the cloud provider.
upvoted 3 times
2Fish
2 years, 1 month ago
I was not sure about this one, but agree with you and most everyone else on C. This is the Best answer from the ones. given.
upvoted 1 times
...
...
iking
2 years, 4 months ago
Selected Answer: D
Those who answer C, i would say don't have any experience in the cloud at all. We are talking about cloud infrastructure where even using IAAS will not even allow touching the hypervisor, only the cloud provider can do the firmware update for you, and you cant even request it because different companies are sharing the same host with your server, assuming this is a public cloud.
upvoted 2 times
iking
2 years, 4 months ago
I would go for B but that doesn't help at all in the current scenario ("Through the use of the cloud host's hypervisor") where the actor has already infiltrated the hypervisor in the cloud, so he has the access to all VM in that specific host and can manipulate all VMs even in the other company who are sharing with that host (in that public cloud host, I will assume).
upvoted 1 times
iking
2 years, 4 months ago
The best way to remediate this is to use a private cloud or dedicated server where you are the only company using that server and not shared with any other companies. This is costly for sure, but the most secure way of deploying servers in the cloud and will definitely remediate the problem. A lot of companies are using this, especially big companies, and has regulated and strict policies, just to be at peace about their data in the cloud. D is the best answer to this question.
upvoted 2 times
catastrophie
2 years, 2 months ago
No, not even remotely....
upvoted 1 times
...
...
...
...
DavidC5
2 years, 6 months ago
Selected Answer: B
I feel like this question is highlighting horizontal privilege escalation so going with B.
upvoted 2 times
...
Tag
2 years, 6 months ago
Selected Answer: C
MFA would be incorrect in this case Yes MFA can be used to reduce the likelihood that the attacker gains access to the VM, however, the scenario specifically states that the attacker was able to escalate rights and the question asks what can be done to remediate the vulnerability. the vulnerability in this case would be the ability to escalate rights. thus to remediate this, its safe to say that the application needs to be patched somehow so C would be correct
upvoted 1 times
...
R00ted
2 years, 6 months ago
Selected Answer: A
Where did it say the hypervisor version wasn't secure or that it is outdated?
upvoted 2 times
Adrian831
2 years, 6 months ago
Well, first of all how hypervisor could be compromised if it doesn't have any vulnerability? and second the question itself said "BEST to remediate the VULNERABILITY the attacker has used to exploit the system?" So, I guess C makes a lot of sense here.
upvoted 2 times
AaronS1990
2 years, 2 months ago
I'm thinking that the vulnerability could be the fact they aren't using MFA...
upvoted 1 times
...
...
...
sh4dali
2 years, 7 months ago
Selected Answer: C
C is correct. Virtual machine (VM) escape attacks target vulnerabilities in the hypervisor supporting a virtualized environment. The strongest control to protect hypervisors against these attacks is to keep them patched.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago