exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 97 discussion

Actual exam question from CompTIA's SY0-601
Question #: 97
Topic #: 1
[All SY0-601 Questions]

Which of the following should be monitored by threat intelligence researchers who search for leaked credentials?

  • A. Common Weakness Enumeration
  • B. OSINT
  • C. Dark web
  • D. Vulnerability databases
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Protract8593
1 year, 9 months ago
Selected Answer: C
Threat intelligence researchers who search for leaked credentials should monitor the dark web. The dark web is a part of the internet that is not indexed by traditional search engines and is intentionally hidden and anonymous. It is a common platform for illegal activities, including the buying and selling of stolen data, including credentials.
upvoted 2 times
...
ApplebeesWaiter1122
1 year, 10 months ago
Selected Answer: C
Threat intelligence researchers who search for leaked credentials should primarily monitor the dark web. The dark web refers to a part of the internet that is not indexed by traditional search engines and is often used for illicit activities. It is a common marketplace for buying and selling stolen data, including leaked credentials such as usernames and passwords. By monitoring the dark web, threat intelligence researchers can identify if any leaked credentials associated with their organization or clients are being traded or shared. This information can be crucial for organizations to take proactive measures to protect their systems and accounts from unauthorized access.
upvoted 2 times
...
MasterControlProgram
2 years, 1 month ago
Selected Answer: C
Threat intelligence researchers who search for leaked credentials should monitor the "dark web". The dark web is a part of the internet that is not indexed by search engines and is accessible only through special software, such as Tor. It is often used for illegal activities, including the buying and selling of stolen data, such as login credentials. By monitoring the dark web, threat intelligence researchers can identify and track leaked credentials and other information that could be used for malicious purposes.
upvoted 2 times
...
scarceanimal
2 years, 3 months ago
Selected Answer: C
C wouldn't help too much at all really, but its the best choice lol.
upvoted 4 times
...
hieptran
2 years, 3 months ago
Selected Answer: C
C fo sho
upvoted 2 times
...
Arcd3746
2 years, 5 months ago
Selected Answer: C
There's no better choice
upvoted 1 times
...
Mewchan
2 years, 7 months ago
Selected Answer: C
Darkweb https://www.hackers-arise.com/post/open-source-intelligence-osint-finding-breached-email-addresses-passwords-and-other-credentials
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago