exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 298 discussion

Actual exam question from CompTIA's SY0-601
Question #: 298
Topic #: 1
[All SY0-601 Questions]

A research company discovered that an unauthorized piece of software has been detected on a small number of machines in its lab. The researchers collaborate with other machines using port 445 and on the Internet using port 443. The unauthorized software is starting to be seen on additional machines outside of the lab and is making outbound communications using HTTPS and SMB. The security team has been instructed to resolve the problem as quickly as possible while causing minimal disruption to the researchers. Which of the following contains the BEST course of action in this scenario?

  • A. Update the host firewalls to block outbound SMB.
  • B. Place the machines with the unapproved software in containment.
  • C. Place the unauthorized application in a blocklist.
  • D. Implement a content filter to block the unauthorized software communication.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
HL2020
Highly Voted 2 years, 5 months ago
Selected Answer: C
I'm guessing C. A isn't correct since we're asked not to disrupt researchers who are using SMB. B would again disrupt and D doesn't really make sense.
upvoted 20 times
osdoodsiosdio2
1 year, 4 months ago
what do you mean D doesn't make sense how is it different from C
upvoted 4 times
...
...
okay123
Highly Voted 2 years, 5 months ago
Selected Answer: C
C makes the most sense
upvoted 9 times
...
KelvinYau
Most Recent 6 months, 2 weeks ago
Selected Answer: B
Containment allows the security team to isolate the affected machines from the network while minimizing disruption to the researchers. This approach helps prevent the unauthorized software from spreading further and making outbound communications without affecting the overall research operations.
upvoted 1 times
KelvinYau
6 months, 2 weeks ago
C. Place the unauthorized application in a blocklist: This could prevent the application from running on new machines but may not immediately address the existing instances of the software.
upvoted 1 times
...
...
Alcpt
7 months, 3 weeks ago
Selected Answer: C
Fastest resolution
upvoted 1 times
...
MALEKMALAHI
10 months ago
Selected Answer: C
Blacklisting the unauthorized application is the most targeted approach that minimizes disruption. Researchers can continue using ports 445 and 443 for legitimate communications as long as the unauthorized software is blocked. Placing the machines in containment would completely halt work on those machines, causing significant disruption.
upvoted 1 times
...
jerseydude
11 months, 1 week ago
B for me "seen on additional machines outside of the lab" - you would need to contain first then block links etc.
upvoted 2 times
...
AbdullahMohammad251
11 months, 3 weeks ago
Selected Answer: B
Option A is incorrect because the researchers are using SMB to communicate and we can't block it. Since the researchers are using the same ports used by the unauthorized software to communicate, the researchers are likely using the unauthorized software to communicate making option C incorrect. Option D is also invalid and irrelevant to our scenario, content filters are used to block certain websites.
upvoted 1 times
Alcpt
7 months, 3 weeks ago
Common dude, this will cause disruption.
upvoted 1 times
...
...
BD69
1 year, 1 month ago
Selected Answer: C
placing machines in containment would be highly disruptive! if the software is unauthorized, the least disruptive thing to do is block it via a block list. the problem with a content filter is that it filters content, not ports - we don't know what that content is. there may be situations (though I can't think of any) where SMB may be required
upvoted 2 times
...
memodrums
1 year, 2 months ago
Selected Answer: C
I would go with C. This is why, as you see more workstations with the unauthorized software, you need to keep putting them into containment. With blocking the software all together, you wont have that issue making more efficient.
upvoted 1 times
...
dsfdg
1 year, 2 months ago
According to the Incident responce answer should be B.
upvoted 2 times
...
eddy72
1 year, 3 months ago
Selected Answer: B
B. Place the machines with the unapproved software in containment. In this scenario, the best course of action is to quickly contain the machines with the unauthorized software to prevent further spread and minimize disruption. Placing the affected machines in containment helps isolate them from the network, preventing the unauthorized software from making outbound communications and spreading to additional machines. While options such as updating host firewalls, implementing a content filter, or placing the unauthorized application in a blocklist may be part of a comprehensive security strategy, containment is the most immediate and targeted response to prevent the unauthorized software from causing further impact and spreading throughout the network.
upvoted 3 times
BD69
1 year, 1 month ago
a blocklist would work immediately and cause the least disruption. Containment would take time and cause the most disruption.
upvoted 2 times
...
...
johnabayot
1 year, 3 months ago
Selected Answer: B
B. place the machines with the unapproved software in containment. This option would prevent the unauthorized software from spreading to other machines and communicating with external servers, while allowing the researchers to continue their work on unaffected machines.
upvoted 1 times
...
shaneo007
1 year, 3 months ago
Answer B. Place the machines with the unapproved software in containment. This would allow the investigation of the infected machine without disrupting the work of researchers
upvoted 1 times
...
Cloudninja117
1 year, 5 months ago
Selected Answer: B
The correct answer is B it’s in the text book by Jason dion and it’s a question that was previously on the last security plus exam
upvoted 2 times
...
Teleco0997
1 year, 5 months ago
Selected Answer: B
reasons for C to be incorrect: Outbound Communications: Blocking the unauthorized application from running on the machine may not automatically prevent its outbound communications. If the application has already established connections or is designed to communicate over the network, those communications might still occur. Preventing Spread: Placing the application in a blocklist on one machine doesn't prevent it from spreading to other machines. If the unauthorized software is propagating through the network, merely blocking it on one machine may not stop its lateral movement. Holistic Solution: Security incidents often require a more comprehensive and holistic solution. Blocking the application is a reactive measure, but containment measures (such as isolating affected machines) and addressing the root cause are proactive steps to mitigate the impact and prevent further spread.
upvoted 1 times
...
Teleco0997
1 year, 5 months ago
Selected Answer: B
my 5c here: Option C suggests placing the unauthorized application in a blocklist, this approach might prevent the unauthorized application from running on the affected machines, but it might not be as effective in stopping its outbound communications or preventing its spread to other machines. In scenarios where the unauthorized software is making outbound communications using HTTPS and SMB and is spreading to other machines, a more comprehensive solution like containment (Option B) is necessary to quickly isolate and address the problem at its source.
upvoted 1 times
MuttleyB
1 year, 4 months ago
The keyword here is "minimal disruption." Device containment will disrupt affect user devices. Since we've got to work within the parameters of least downtime, C will have to do.
upvoted 1 times
...
...
DChilds
1 year, 6 months ago
Selected Answer: B
In line with the incident response process, the breach has been identified, the next step is containment. All other remedies require an emergency change to be logged but the first step should be containment.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago