exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 267 discussion

Actual exam question from CompTIA's SY0-601
Question #: 267
Topic #: 1
[All SY0-601 Questions]

A well-known organization has been experiencing attacks from APTs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB sticks that are dropped in parking lots. Which of the following is the BEST defense against this scenario?

  • A. Configuring signature-based antivirus to update every 30 minutes
  • B. Enforcing S/MIME for email and automatically encrypting USB drives upon insertion
  • C. Implementing application execution in a sandbox for unknown software
  • D. Fuzzing new files for vulnerabilities if they are not digitally signed
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
nobnarb
Highly Voted 2 years, 7 months ago
Selected Answer: C
On what planet does encrypting an enemy flash drive do anything for your company's security?
upvoted 21 times
xyzakash
1 year, 10 months ago
man i selected b> but after reading your comment > i am hiding my face
upvoted 5 times
...
Kurt43
1 year, 9 months ago
encrypting a flash drive with malware on it will lock the malware behind the encryption and unable to execute.
upvoted 1 times
...
...
FMMIR
Highly Voted 2 years, 6 months ago
Selected Answer: C
The best defense against the scenario described is implementing application execution in a sandbox for unknown software. A sandbox is a controlled environment in which an application can be executed and observed without affecting the rest of the system. This allows the application to be run safely, even if it is unknown or potentially malicious. If the application is found to be malicious, it can be terminated without damaging the rest of the system. Configuring signature-based antivirus to update every 30 minutes can help protect against known malware, but it will not protect against custom malware that has not yet been detected. Enforcing S/MIME for email and automatically encrypting USB drives upon insertion can help protect against unauthorized access to sensitive data, but it will not protect against malware that is installed on a system. Fuzzing new files for vulnerabilities can help identify potential weaknesses in software, but it will not protect against malware that is already installed on a system
upvoted 6 times
viksap
2 years, 6 months ago
Are you scheduled to take your exam soon or have you taken it?
upvoted 1 times
...
...
Grumpy_Old_Coot
Most Recent 1 year, 5 months ago
Selected Answer: C
Sandbox. Too bad "non-persistent Sandbox VM in the PurpleVLAN" isn't a valid answer. There was (might still be) a Linux Distribution that auto-sandboxed any external device/file/filesystem.
upvoted 1 times
...
Mahoni
1 year, 8 months ago
Selected Answer: B
B- because your emails will then be safe and usb drives will get encrypted and become unusable exactly like your pcs getting unusable after your drive/files get encrypted and become unusable, AKA Ransomware attack. Not C because it only works against "unknown software", what about an excel sheet with macros enabled, a pdf file hiding a malicious code etc?
upvoted 2 times
...
val4
1 year, 9 months ago
GPT: A
upvoted 1 times
...
ApplebeesWaiter1122
1 year, 11 months ago
Selected Answer: C
Implementing application execution in a sandbox for unknown software is the best defense against custom malware being delivered via email or USB sticks. A sandbox is a controlled environment that isolates and runs unknown or potentially malicious software in a safe manner. By running potentially dangerous files in a sandbox, the organization can analyze their behavior and actions without risking the actual system's security.
upvoted 4 times
Soleandheel
1 year, 8 months ago
The problem with the Sandbox approach with regard to this question is that an organization has other departments than the IT department. These malicious emails and USB sticks would be exposed to people who have no clue what a sandbox is. The folks in the IT department may have the knowledge and expertise to use a sandbox, but the rest of the organization is not equipped for that. Most people in an organization are not technology savvy and that's something a security engineer needs to be aware of. Knowing how to create solutions for people who are not sophisticated from a technology standpoint is an essential part of your job as a security engineer. As such, answer B is a more accurate answer to the question in my opinion.
upvoted 2 times
...
...
fouserd
2 years, 1 month ago
Selected Answer: C
The BEST defense against this scenario would be to implement application execution in a sandbox for unknown software. A sandbox is a security mechanism that separates running programs and restricts their access to system resources. This can help prevent custom malware from causing harm to the organization’s systems.
upvoted 1 times
...
RobbieT
2 years, 2 months ago
Ancer C makes total sense. Any unknown application gets sent to a sandbox which is a safe area for investigating malware and the like. On a side note, encrypting mail and usb data does nothing for system protection.
upvoted 1 times
...
DanDare
2 years, 3 months ago
Ok, I get that C is the closest answer to the question. However, this is the worst question I've yet to come across. For starters, why would anyone pick up a USB stick they found in the parking lot, then put it in a work computer and proceed to run whatever code was installed on it. Secondly, if someone was capable of doing something like that, do you think they would have the mindset to only run it in a sandbox environment? The same thing goes for anyone that would execute code by clicking on an email attachment.
upvoted 3 times
...
DaraVasu
2 years, 4 months ago
answer:c quizlet says it's C Implementing application execution in a sandbox for unknown software
upvoted 1 times
...
ramesh2022
2 years, 4 months ago
Selected Answer: B
B. Enforcing S/MIME for email and automatically encrypting USB drives upon insertion is the best defense against this scenario. S/MIME is an email encryption standard that adds digital signatures to emails, ensuring that only verified parties can read the communications. Additionally, automatically encrypting USB drives upon insertion ensures that any data stored on the drive is secure and inaccessible to unauthorized individuals.
upvoted 1 times
...
cuzimw0rthit
2 years, 4 months ago
Selected Answer: C
whats the point in encrypting data .. so C
upvoted 2 times
...
ronniehaang
2 years, 5 months ago
Selected Answer: B
B. Enforcing S/MIME for email and automatically encrypting USB drives upon insertion In the described scenario, the best defense is to enforce S/MIME for email and automatically encrypt USB drives upon insertion. S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public key encryption and digital signatures for email. This helps to ensure that the email is encrypted end-to-end, making it more difficult for attackers to intercept and read sensitive information. Automatically encrypting USB drives upon insertion helps to ensure that the data on the drive is protected in case it is lost or stolen. This way, even if the attacker is able to copy the malware to the drive, it will be encrypted and unreadable, reducing the risk of a successful attack.
upvoted 3 times
NerdAlert
2 years, 3 months ago
they are not giving the USB back to the attacker - what if they create a backdoor or install malware? Encryption wont really serve a purpose
upvoted 2 times
...
ArthurCockburn
2 years, 5 months ago
You're reading the question entirely wrong. The issue isn't that emails/USB sticks with sensitive data are not encrypted and being read by attackers. The question statements the delivery system for custom malware is email and USB sticks being left in parking lots (and implies that the users are plugging them into the target networks, compromising them). Encrypting data doesn't change that the malware has already reached the target network. Implementing application execution of unknown software in a sandbox would completely remove the possibility that users unknowingly run a malicious application they recieved through an email or found on a USB stick.
upvoted 4 times
...
...
Nirmalabhi
2 years, 5 months ago
just dont understand how can it be C sandoboxing . it has nothing to do with USB ?
upvoted 1 times
Sandon
2 years, 5 months ago
It does
upvoted 1 times
...
Ranaer
2 years, 5 months ago
/The organization is concerned that custom malware is being created and emailed into the company or installed on USB sticks that are dropped in parking lots. / There is custom malware on the USB sticks. And you can try to train people as much as you want, they will always be stupid and/or make mistakes and plug that USB into one of your machines. Your compensating control is that you force any application into a sandbox so they cant harm your network.
upvoted 1 times
...
...
okay123
2 years, 6 months ago
Selected Answer: B
It's B because why would we encrypt malware? The goal of encryption is to protect data by preventing it from being accessed by unauthorized users. Sandboxing is used to isolate software suspected to be malicious. So it's B
upvoted 2 times
Sandon
2 years, 5 months ago
Encrypting malware does not stop it
upvoted 2 times
...
...
BluEric
2 years, 7 months ago
Selected Answer: C
Going with C . Encrypting malware will not protect the system, it'll just protect the malware itself. A sandbox environment will ensure malware does not get into the real system.
upvoted 4 times
...
carpathia
2 years, 7 months ago
Selected Answer: C
Unless I haven't heard of this method, how s/MIME and encrypting usb sticks protects agaianst malware? If it's custom malware, antivirus won;t help. Most probably C, sandbox, but then I am not sure how a sandbox, even though I am nots sure how it works, is this a software on every machine that can be installed and triggeres the snadbox automatically, is it a separate isolated system? Someone with knowledge would be of great help. If it's a separate sysytem it doesn't nake any sense in this question as an answer.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...