exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 296 discussion

Actual exam question from CompTIA's SY0-601
Question #: 296
Topic #: 1
[All SY0-601 Questions]

While checking logs, a security engineer notices a number of end users suddenly downloading files with the .tar.gz extension. Closer examination of the files reveals they are PE32 files. The end users state they did not initiate any of the downloads. Further investigation reveals the end users all clicked on an external email containing an infected MHT file with an href link a week prior. Which of the following is MOST likely occurring?

  • A. A RAT was installed and is transferring additional exploit tools.
  • B. The workstations are beaconing to a command-and-control server.
  • C. A logic bomb was executed and is responsible for the data transfers.
  • D. A fileless virus is spreading in the local network environment
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
SophyQueenCR82
Highly Voted 2 years, 3 months ago
A. A RAT was installed and is transferring additional exploit tools. “Remote Access Trojan A remote access Trojan (RAT) is a type of malware that allows attackers to control systems from remote locations. It is often delivered via drive-by downloads or malicious attachments in email. Once installed on a system, attackers can then access the infected computer at any time and install additional malware if desired. A growing trend is for attackers to deliver trojans as Portable Executable (PE) files in 32-bit (PE32) and 64-bit (PE64) formats. They often compress the PE files using compression tools, such as tar (sometimes called tarball). Tar files have the .tar.gz file extension.” Excerpt From CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide Darril Gibson https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewBook?id=0 This material may be protected by copyright.
upvoted 26 times
BD69
1 year, 3 months ago
Wouldn't a RAT be on just one machine? The question indicates multiple machines involved.
upvoted 1 times
...
7b241d4
1 year, 6 months ago
tar does not compress, it can bundle up files and directories into tarballs (.tar extension) (usually for archiving). However, you can use tools like gzip to compress a tarball, which is what gives it the .gz extension.
upvoted 2 times
...
...
560exam
Highly Voted 2 years, 6 months ago
Selected Answer: A
Going with A on this one. it makes the most sense to me. RATs are typically downloaded together with a seemingly legitimate program, like a game, or are sent to the target as an email attachment. Once the attacker compromises the host's system, they can use it to distribute RATs to additional vulnerable computers, establishing a botnet.
upvoted 16 times
...
Coznet
Most Recent 1 year, 1 month ago
God ! I hate comptia ! A: A RAT can be used to download additional tools but it is typically hidden in a useful app (trojan). D: A fileless virus is hidden in a file (ex: MHT). It loads in RAM and then downloads a payload that runs shell commands (live off the land). C: The fact that all downloads were initiated at the same time after 1 week is indicative of a logic bomb too. Take your pick, I lean towards D since the arbitrary code was in a file and not an app.
upvoted 2 times
...
Nemish71
1 year, 1 month ago
Selected Answer: A
I don't see data transfer
upvoted 1 times
...
BD69
1 year, 3 months ago
Selected Answer: A
I don't see how this could be D: fileless viruses don't spread, right? that would be a worm, correct?
upvoted 1 times
...
LordJaraxxus
1 year, 4 months ago
Selected Answer: D
The answer is A. RAT and this is what I found: A remote access Trojan (RAT) is a type of malware that allows attackers to control systems from remote locations. It is often delivered via drive-by downloads or malicious attachments in email. Once installed on a system, attackers can then access the infected computer at any time and install additional malware if desired. A growing trend is for attackers to deliver trojans as Portable Executable (PE) files in 32-bit (PE32) and 64-bit (PE64) formats. They often compress the PE files using compression tools, such as tar (sometimes called tarball). Tar files have the .tar.gz file extension.
upvoted 1 times
...
Teleco0997
1 year, 7 months ago
Selected Answer: A
RAT it is as they are downloading stuff without any intervention
upvoted 2 times
...
TONADO
1 year, 7 months ago
I would go with RAT here because end users refuse they did not initiate the downloading
upvoted 1 times
...
Yarzo
1 year, 8 months ago
Selected Answer: B
B. The workstations are beaconing to a command-and-control server. The scenario described, where end users suddenly download files with the .tar.gz extension and further examination reveals these files are PE32 files (typically Windows executables), suggests that the workstations may be compromised and communicating with a command-and-control (C2) server. This is a common behavior seen in various types of malware infections, and it aligns with the symptoms described in the question.
upvoted 4 times
...
Afel_Null
1 year, 8 months ago
Selected Answer: C
Downloaded files being PE32 suggests a trojan, but why would an attacker wait a week to start it? He would start downloading immediately. I'm going with logic bomb. Transfers all starting exactly after a week is a by-the-books example of logic bomb.
upvoted 6 times
shover
1 year, 8 months ago
As per Darryl Gibson comptia study guide it’s common for rats to have tar.gz file extensions and pe files. Doesn’t mention if / then statement associated with logic bombs
upvoted 5 times
...
...
rline63
1 year, 9 months ago
These questions are so confusing to me. It says a large number of stations started downloading these files suddenly a week after the compromise. It sounds like a logic bomb was set on all of these machines at the same time. I don't know why I would choose RAT over that based on other questions in this guide.
upvoted 1 times
Afel_Null
1 year, 8 months ago
I legit believe the answer for this one is just the one you didn't choose. How are you going to prove to comptia that your answer is correct? Both logic bomb and RAT are equally viable here. You just have to roll the dice.
upvoted 2 times
...
ThaKyd88
1 year, 8 months ago
Remember they click on an external email which downloaded a malicious file.
upvoted 2 times
...
...
predsednik
1 year, 10 months ago
Selected Answer: C
I would go with C here. All victims started downloading PE32 files (which are mostly Windows executable files) a week after they all clicked on the certain MHT which probably contained malicious time bomb code which said "Hey you stupid dumb a$$ start downloading this executable when this time condition is met let it be this Sunday at noon" and all who clicked and infected their computer with this started downloading this PE32 file with the executable to perform some other attack . Second if it was a RAT why would attacker wait for a week to tart the attack, he would probably start the attack as soon as he established connection with the compromised system Third If it was a RAT how would attacker simultaneously attack all compromised systems at the same time, I mean it is very unlikely that attacker using RAT is attacking more than one system at the time. So with all said above my educated guess is that this was a MHT file infected with the logic bomb malicious code instructing compromised system to start downloading executable malicious file at the set time.
upvoted 4 times
...
SlySyrup
1 year, 11 months ago
Selected Answer: C
My gut says Logic Bomb simply from this sentence: "While checking logs, a security engineer notices a number of end users suddenly downloading files with the .tar.gz extension.". Execution with no user interaction at exactly the same time a week after the initial download.
upvoted 5 times
...
ApplebeesWaiter1122
1 year, 11 months ago
Selected Answer: A
Option A, which suggests the installation of a RAT and transfer of additional exploit tools, aligns with the behavior described in the scenario. The end users' workstations being compromised through the infected MHT file could have allowed an attacker to gain unauthorized remote access and control over those systems. The downloaded .tar.gz files could potentially contain the additional exploit tools used by the attacker to further compromise the affected machines or carry out other malicious activities.
upvoted 2 times
...
LeonardSnart
2 years ago
Selected Answer: A
This question VERY closely mirrors one from the book CompTIA Security+ Get Certified Get Ahead SY0-601 by Darril Gibson with the answers slightly different in a different order, but the answer is RAT. The question from the book "37. Some network appliances monitoring incoming data have recently started sending alerts on potentially malicious files. You discover that these are PE32 files with the tar.gz extension, and they are being downloaded to several user systems. After investigating further, you discover these users previously opened an email with an infected MHT file. Which of the following answers BEST describes this scenario? A. The systems have joined a botnet. B. Users installed ransomware. C. Users installed a RAT, and it is downloading additional tools. D. Shadow IT is running in the network."
upvoted 11 times
LeonardSnart
2 years ago
The answer & explanation from the book (keep in mind C here refers to RAT, the CompTIA question answer equivalent is A) "37. C is correct. This indicates that users installed a remote access Trojan (RAT) when they opened the email containing the malicious MHT file. An MHT file (or MHTML) is a webpage archive, and it will store HTML, CSS, images, JavaScript, and anything else in the webpage. After installing the RAT, attackers later began downloading Portable Executable (PE32) files to the compromised systems. While the systems may have joined a botnet, the scenario doesn’t indicate that they are part of a botnet. Ransomware would indicate that it has controlled the user’s computer or data, but this isn’t indicated in this scenario. Shadow information technology (IT) refers to any unauthorized systems or applications within an organization. See Chapter 6."
upvoted 5 times
...
...
indyrckstar
2 years ago
Selected Answer: A
This is RAT
upvoted 1 times
...
mkapp98
2 years, 2 months ago
A. https://www.bleepingcomputer.com/news/security/new-wsh-rat-malware-targets-bank-customers-with-keyloggers/
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...