exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 301 discussion

Actual exam question from CompTIA's SY0-601
Question #: 301
Topic #: 1
[All SY0-601 Questions]

A security analyst is investigating an incident to determine what an attacker was able to do on a compromised laptop. The analyst reviews the following SIEM log:



Which of the following describes the method that was used to compromise the laptop?

  • A. An attacker was able to move laterally from PC1 to PC2 using a pass-the-hash attack.
  • B. An attacker was able to bypass application whitelisting by emailing a spreadsheet attachment with an embedded PowerShell in the file.
  • C. An attacker was able to install malware to the C:\asdf234 folder and use it to gain administrator rights and launch Outlook.
  • D. An attacker was able to phish user credentials successfully from an Outlook user profile
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
JSOG
Highly Voted 2 years, 5 months ago
Selected Answer: B
agree with B as powershell was the only injection that worked
upvoted 13 times
[Removed]
2 years, 5 months ago
Where is the spreadsheet attachment according to the diagram and the B answer that you selected?
upvoted 6 times
Blueteam
2 years, 5 months ago
The first event says that .exe file was blocked. The second event says that PowerShell process started and initiated by outlook. So an email attachment is most likely the case. Among all available options B is talking about attachment. It is not known that is Spreadsheet but it is the only correct option.
upvoted 24 times
Nirmalabhi
2 years, 3 months ago
excellent crack. Thanks Mate
upvoted 6 times
...
...
...
...
123gLO
Highly Voted 1 year, 4 months ago
1/12/24 This was on the test
upvoted 8 times
edoardottt
1 year, 4 months ago
What did you answer? Do you think it's B?
upvoted 1 times
...
...
Bhatyi
Most Recent 1 year, 3 months ago
Selected Answer: A
Answer is A
upvoted 1 times
BD69
1 year, 2 months ago
Can't be. If there was a pass-the-hash, it was blocked (as the log shows) and couldn't compromise the laptop
upvoted 2 times
...
...
thecheat97
1 year, 5 months ago
I just took the vendor and most of these questions aren't even on there. I would say like 99% of these aren't even on there
upvoted 1 times
klinkklonk
1 year, 3 months ago
You sure you did 601 and not 701
upvoted 3 times
...
kevgjo
1 year, 4 months ago
stop the cap
upvoted 3 times
...
...
Teleco0997
1 year, 6 months ago
Selected Answer: B
the only thing the attacker tried and was not blocked
upvoted 1 times
...
Afel_Null
1 year, 7 months ago
Selected Answer: B
A blocked app (grouppolicy == application whitelisting), a powershell process launched via outlook. Everything fits. There is no mention of any hashes, and hacker was not able to log into PC2 so lateral movement, if present, failed.
upvoted 3 times
...
workhard
2 years ago
Selected Answer: A
I think it is A, despite the discrepancy with the voters. "A pass the hash attack takes advantage of weak points in the NT LAN Manager (NTLM) and LANMAN protocols. If the attacker has the hash of a user’s password, the attacker can skip any kind of brute-force attack and use the hashed password to access the network." (from: Mike Meyers CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) by Mike Meyers, Scott Jernigan) Also, the powershell script is named “lat” and PC1 attempted to log into PC2
upvoted 2 times
rline63
1 year, 8 months ago
It says in PC2 the login attempt was failed, implying that while a pas the hash may have been attempted it failed.
upvoted 5 times
...
...
princajen
2 years, 1 month ago
Selected Answer: B
Based on the provided information, it appears that the attacker was able to bypass application whitelisting by emailing a spreadsheet attachment with an embedded PowerShell in the file, as indicated by the "New Process" event with the process name "lat.ps1" and the "Creator Process Name" of "powershell.exe". This suggests that the attacker was able to execute a PowerShell script to run malicious code. Therefore, the answer is B.
upvoted 2 times
...
Samo1
2 years, 2 months ago
Selected Answer: A
i have never heard of embedded Powershell in a spreadsheet before. and if so, then it should show outlook opening MS Excel instead of powershell. Excel will open Powershell not outlook. typically VBScript code is embedded in a Macro, not powershell.
upvoted 4 times
BD69
1 year, 1 month ago
VBScript code can be used to invoke Powershell in Excel Sub RunPowerShellScript() Dim psScriptPath As String Dim returnValue As String ' Path to your PowerShell script psScriptPath = "C:\Path\To\YourScript.ps1" ' Using Shell function to execute the PowerShell script returnValue = Shell("powershell -ExecutionPolicy Bypass -File """ & psScriptPath & """", vbNormalFocus) End Sub
upvoted 1 times
...
...
ramesh2022
2 years, 2 months ago
Selected Answer: A
Pass-the-Hash is a credential theft and lateral movement technique in which an attacker abuses the NTLM authentication protocol to authenticate as a user without ever obtaining the account's plaintext password.
upvoted 2 times
...
viksap
2 years, 5 months ago
What about the logs showing going from PC1 TO PC2
upvoted 4 times
bkrich
2 years ago
On the PC2 log, it says an account failed to log on, so it looks like the lateral movement wasn't successful.
upvoted 4 times
...
Ranaer
2 years, 3 months ago
While there have been attempts to login on PC2, we dont have evidence to be anything related to pass the hash, so I think its safe to assume this isnt the correct answer.
upvoted 5 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago