exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 203 discussion

Actual exam question from CompTIA's SY0-601
Question #: 203
Topic #: 1
[All SY0-601 Questions]

An attacker has determined the best way to impact operations is to infiltrate third-party software vendors. Which of the following vectors is being exploited?

  • A. Social media
  • B. Cloud
  • C. Supply chain
  • D. Social Engineering
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
serginljr
Highly Voted 2 years, 7 months ago
Selected Answer: C
C it's correct answer
upvoted 6 times
gen2dee
2 years, 7 months ago
explain pls
upvoted 1 times
i_bird
2 years, 7 months ago
Supply chain attacks are an emerging kind of threat that target software developers and suppliers. The goal is to access source codes, build processes, or update mechanisms by infecting legitimate apps to distribute malware. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwjcye66gKv6AhXWjIkEHZ2BDAMQFnoECAUQAw&url=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fintelligence%2Fsupply-chain-malware%23%3A~%3Atext%3DSupply%2520chain%2520attacks%2520are%2520an%2Clegitimate%2520apps%2520to%2520distribute%2520malware.&usg=AOvVaw3RhD4fF-pUIEOJD0fGVjn7
upvoted 8 times
...
...
...
ApplebeesWaiter1122
Most Recent 1 year, 9 months ago
Selected Answer: C
In this scenario, the attacker is targeting third-party software vendors, which are part of the supply chain. Supply chain attacks involve targeting and compromising the components, software, or services provided by third-party vendors, which can then be used to gain unauthorized access or control over the targeted organization's systems. By infiltrating the third-party software vendors, the attacker can potentially insert malicious code, backdoors, or vulnerabilities into the software products distributed to customers, leading to broader impact and potential compromise of multiple organizations.
upvoted 3 times
...
DWISE1
2 years, 1 month ago
Third and Fourth-Party Vendors ‍The rise in outsourcing means that your vendors pose a huge cybersecurity risk to your customer's data and your proprietary data. Some of the biggest data breaches were caused by third parties.
upvoted 1 times
...
FMMIR
2 years, 4 months ago
Selected Answer: C
The attacker is exploiting the supply chain vector. The supply chain refers to the series of processes and organizations involved in the production, distribution, and delivery of goods and services. By infiltrating third-party software vendors, the attacker is attempting to gain access to the supply chain and compromise the software that is used by the organization. This can allow the attacker to launch attacks, steal sensitive data, or disrupt operations by inserting malicious code into the software. Social media, cloud, and social engineering are not directly related to the supply chain and would not be effective for infiltrating third-party software vendors.
upvoted 3 times
...
JSOG
2 years, 5 months ago
Selected Answer: D
going with D too
upvoted 1 times
Sandon
2 years, 3 months ago
That ain't it buddy
upvoted 4 times
...
...
MarciaL
2 years, 6 months ago
I'm going with D. Social Engineering
upvoted 4 times
...
RonWonkers
2 years, 7 months ago
Selected Answer: C
C is correct
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago