exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 250 discussion

Actual exam question from CompTIA's SY0-601
Question #: 250
Topic #: 1
[All SY0-601 Questions]

An IT security manager requests a report on company information that is publicly available. The manager's concern is that malicious actors will be able to access the data without engaging in active reconnaissance. Which of the following is the MOST efficient approach to perform the analysis?

  • A. Provide a domain parameter to theHarvester tool.
  • B. Check public DNS entries using dnsenum.
  • C. Perform a Nessus vulnerability scan targeting a public company’s IP.
  • D. Execute nmap using the options: scan all ports and sneaky mode.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Kashim
Highly Voted 2 years, 8 months ago
Selected Answer: A
https://www.kali.org/tools/theharvester/
upvoted 17 times
...
[Removed]
Highly Voted 2 years, 8 months ago
Selected Answer: A
theharvester The package contains a tool for gathering subdomain names, e-mail addresses, virtual hosts, open ports/ banners, and employee names from different public sources (search engines, pgp key servers). kashim
upvoted 14 times
...
AspiringNerd
Most Recent 1 year, 1 month ago
Selected Answer: A
The most efficient approach to perform the analysis and gather publicly available company information without engaging in active reconnaissance is: A. Provide a domain parameter to theHarvester tool. TheHarvester is a reconnaissance tool used for gathering information about email addresses, domain names, and subdomains associated with a target organization. By providing the domain parameter to theHarvester, the tool can query various public sources, such as search engines, social media platforms, and public databases, to collect information about the company that is publicly available. This approach allows the IT security manager to gather relevant information about the company's online presence and potential exposure to malicious actors without directly probing or scanning the company's network or systems, thereby minimizing the risk of alerting or attracting unwanted attention from adversaries.
upvoted 1 times
...
LordJaraxxus
1 year, 3 months ago
Selected Answer: A
As an example, theHarvester is a passive reconnaissance commandline tool used by testers in the early stages of a penetration test. It uses OSINT methods to gather data such as email addresses, employee names, host IP addresses, and URLs. It uses popular (and not so popular) search engines for queries and then correlates the results in a comprehensive report
upvoted 2 times
...
Pisces225
1 year, 3 months ago
Selected Answer: A
Direct copy from the CompTIA Sec+ material: theHarvester is a tool for gathering open-source intelligence (OSINT) for a particular domain or company name (github.com/laramies/theHarvester). It works by scanning multiple public data sources to gather emails, names, subdomains, IPs, URLs and other relevant data.
upvoted 1 times
...
Grumpy_Old_Coot
1 year, 4 months ago
Selected Answer: A
Key here is "public information." The Harvester wins.
upvoted 1 times
...
Soleandheel
1 year, 7 months ago
B is the best answer here. This option gathers information without actively probing the target network which is less invasive compared to the other options provided. Using theharvestes sounds like the obvious answer but it is wrong because it can trigger security alerts.
upvoted 1 times
...
Yarzo
1 year, 7 months ago
Selected Answer: B
B. Check public DNS entries using dnsenum. The most efficient approach to analyze company information that is publicly available without engaging in active reconnaissance, which could potentially raise red flags or disrupt services, is to use a tool like "dnsenum" to check public DNS entries. Dnsenum is a passive reconnaissance tool that gathers information from DNS records and publicly available data sources without actively probing or scanning the target network. It helps collect information about hostnames, subdomains, IP addresses, and more based on the DNS data that is publicly accessible. This approach is less likely to trigger security alerts or be considered invasive, making it a suitable choice for gathering publicly available data in a non-disruptive manner.
upvoted 2 times
...
goodmate
1 year, 7 months ago
If you use ChatGBT wisely it gives the true answer. Here ChatGBT omits "the MOST efficient approach to perform the analysis" and I ask the question stating the efficieny, it changed B to A.
upvoted 1 times
...
Abbey2
1 year, 9 months ago
Use ChatGPT at your peril.
upvoted 2 times
TBOY88
1 year, 8 months ago
what is the answer pls
upvoted 1 times
...
...
ApplebeesWaiter1122
1 year, 10 months ago
Selected Answer: A
TheHarvester is a reconnaissance tool used to gather publicly available information about a target domain. By providing the domain parameter to theHarvester, the tool will search for and collect information from various public sources such as search engines, social networks, and other online resources. This can include email addresses, subdomains, employee names, and other information that could be publicly accessible. Using theHarvester to gather such information is an efficient approach as it allows the IT security manager to quickly obtain relevant data about the company's publicly available information without engaging in any intrusive or active reconnaissance methods. It provides a passive way to discover potential security risks and information exposure without directly interacting with the target's systems or networks.
upvoted 5 times
...
ronah
1 year, 11 months ago
Selected Answer: B
While option A, using theHarvester tool with a domain parameter, can also be a valid approach to gather publicly available information, it may not be as efficient as option B in the given scenario. per chat gpt
upvoted 1 times
...
ramesh2022
2 years, 3 months ago
Selected Answer: A
A. Provide a domain parameter to theHarvester tool is the most efficient approach to perform the analysis. TheHarvester is a powerful tool specifically designed to search and identify public data related to a domain or organization. This tool can quickly gather information such as emails, subdomains, and hostnames that are publicly available.
upvoted 2 times
...
nicekoda
2 years, 5 months ago
A and B are used for passive information gathering, but theHarvester tool is used for searching emails. The correct answer is B. Others are for active information gathering
upvoted 1 times
Sandon
2 years, 4 months ago
No sir, that ain't it.
upvoted 4 times
...
...
[Removed]
2 years, 5 months ago
I would like to vote for A, but my thinking is… Is this the most practical solution? Harvester tool = Python… I guess Im trying to compare A and B.. Eventhough both answers make sense in a way.. Im trying to figure what could be the best solution from the practicality and basic perspectives from Cyber Security…
upvoted 1 times
...
mmains
2 years, 6 months ago
Selected Answer: A
theharvester The package contains a tool for gathering subdomain names, e-mail addresses, virtual hosts, open ports/ banners, and employee names from different public sources (search engines, pgp key servers).
upvoted 1 times
...
Blueteam
2 years, 6 months ago
The answer is A. The question is about active and non active recon. Only option A fits.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...