exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 323 discussion

Actual exam question from CompTIA's SY0-601
Question #: 323
Topic #: 1
[All SY0-601 Questions]

A retail store has a business requirement to deploy a kiosk computer in an open area. The kiosk computer’s operating system has been hardened and tested. A security engineer is concerned that someone could use removable media to install a rootkit. Which of the following should the security engineer configure to BEST protect the kiosk computer?

  • A. Measured boot
  • B. Boot attestation
  • C. UEFI
  • D. EDR
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RvR109
Highly Voted 2 years, 3 months ago
Selected Answer: A
"Measured Boot is a new feature of Windows 8 that was created to help better protect your machine from rootkits and other malware. Measured Boot will check each start up component including the firmware all the way to the boot drivers and it will store this information in what is called a Trusted Platform Module (TPM)." https://www.microcenter.com/tech_center/article/8862/what-is-measured-boot
upvoted 31 times
...
skorza
Highly Voted 2 years, 3 months ago
Selected Answer: A
CHat GPT says EDR is typically used to detect and respond to threats after they have already bypassed other security measures. It is a reactive measure, rather than a preventative one. In this scenario, it would be better to prevent the rootkit from being installed in the first place, rather than relying on EDR to detect and respond to the threat after the fact. Measured boot, on the other hand, is a preventative measure that ensures the system starts with a known good state and can block the boot process or alert the security team if any changes are detected. Therefore, Measured boot is the BEST option for protecting the kiosk computer from the installation of a rootkit via removable media.
upvoted 16 times
BD69
1 year, 2 months ago
ChatGPT is often wrong and lacks true understanding, so take it's suggestions with a grain of salt. In this case an EDR is useless for a bootable USB (which you can disable all bootable devices in the UEFI) and would only detect a rootkit delivery system, not a rootkits. Also you have to consider that EDR is mostly useless for zero-day attacks and consider that, even if the USB malware did install a rootkit from the OS, on the next boot, it would be immediately detected, if you configured boot attestation correctly.
upvoted 2 times
...
Zdane
2 years, 1 month ago
It sounds ok, but ChatGPT often hallucinates info it provides, even making up the sources. I would not depend on it in search for "truth"
upvoted 8 times
user82
2 years, 1 month ago
Yup, it just told me the answer is D. So there you go
upvoted 3 times
user82
2 years, 1 month ago
I meant C
upvoted 1 times
...
...
...
...
5e5650c
Most Recent 10 months, 3 weeks ago
Mensured Boot is a new tool from Windows 8, it is created to protect your machine for rootkits, EDR Endpoint Detection and Response is an advanced tool that monitors the red and prevent APT But in this specif question the answered is measured boot
upvoted 1 times
...
Fyssy
11 months, 1 week ago
UEFI, especially when combined with Secure Boot, provides a robust defense against rootkits. Secure Boot is a feature of UEFI that ensures only signed and trusted operating system bootloaders and drivers can be loaded during the boot process. This helps prevent unauthorized code, such as rootkits, from being loaded, even if someone tries to install them via removable media.
upvoted 2 times
...
Froggy300
11 months, 3 weeks ago
Selected Answer: A
Measured boot will check startup components including firmware/boot drivers and only allow approved versions.
upvoted 1 times
...
shady23
1 year, 1 month ago
Selected Answer: C
Unified Extensible Firmware Interface (UEFI) is a specification for a software program that connects a computer's firmware to its operating system (OS). UEFI is expected to eventually replace basic input/output system (BIOS) but is compatible with it.
upvoted 3 times
...
shady23
1 year, 1 month ago
Selected Answer: C
Unified Extensible Firmware Interface (UEFI) is a specification for a software program that connects a computer's firmware to its operating system (OS). UEFI is expected to eventually replace basic input/output system (BIOS) but is compatible with it.
upvoted 2 times
...
BD69
1 year, 2 months ago
Selected Answer: B
Measured boot is typically for hardware and driver checking. I don't see it helping prevent a rootkit. Boot attestation, on the other hand, confirms the OS has not been tampered with. That said, B would be the most prudent choice, IMO. The problem with EDR is that it loads AFTER the OS and can't detect if a rootkit was installed or not (if a zero-day, you're screwed). If you configure your boot process, you can prevent a bootable USB from ever running in the first place. (you can disable all the USB ports as well, in UEFI, but then you can't use them and the kiosk may need it - depending on what the kiosk's function is)
upvoted 1 times
BD69
1 year, 2 months ago
I'm going with A, actually. The reason is that Boot Attestation is something that Measured Boot is part of -> it reports boot measurements to the attestation service, which then verifies the state of the computer. The Boot Measurements include: Secure Boot (UEFI) and Trusted Boot (Verifies that the OS and system drivers are properly signed and trusted). As I said before EDR is useless in preventing bootable USB (rootkits generally need the system to re-boot after deposition to become truly active), especially for a zero-day attack
upvoted 1 times
...
...
LordJaraxxus
1 year, 3 months ago
Selected Answer: A
Many organizations implement boot integrity processes. These processes verify the integrity of the operating system and boot loading systems. For example, it can verify that key operating system files haven’t been changed. A measured boot goes through enough of the boot process to perform these checks without allowing a user to interact with the system. If it detects that the system has lost integrity and can no longer be trusted, the system won’t boot.
upvoted 1 times
...
david124
1 year, 5 months ago
Selected Answer: A
Measured Boot is intended to prevent boot-level malware. unlike secure boot, measured boot does't validate against a known good list of signatures before booting. instead it relies on the UEFI firmware to hash the firmware, bootloader, drivers, and anything else that is part of the boot process. then the data gathered is stored in the TPM. This boot attestation process allows comparison against known good states and admins can take action if the measured boot shows a difference from the accepted or secure known state.
upvoted 3 times
...
[Removed]
1 year, 5 months ago
Selected Answer: C
im thinking uefi
upvoted 2 times
...
AceVander
1 year, 6 months ago
Since the question says, the OS has been "hardened and tested" I know that the OS has already been installed and Secure boot must be enabled before the installation of an OS. (Even though most computers these days have UEFI Secure boot enabled by default) A, B, and C are are processes or provided by UEFI Secure boot Even if I do not assume, UEFI secure boot is enabled by default, the question asks what should be "CONFIGURED?" UEFI secure boot is enabled (not configured) and the main concern is removable media installing rootkits. D. EDR (makes the most sense to configure endpoint detection for removable media on the kiosk)
upvoted 1 times
...
TONADO
1 year, 7 months ago
I go with answer A: According to CompTIA sec+ Study Guide, Secure Boot or Measured Boot is a feature of Unified Extensible Firmware Interface(UEFI) that ensures that code that ius executed during boot process has been authenticated b y a cryptographic signature. Secure Boot prevents malicious code from running at boot time, thus providing assurance that the system is executing only the code that is legitimate. This provides a measure of protection against rootkits and other malicious code that is designed to run at boot time.
upvoted 3 times
...
rasadebayor
1 year, 7 months ago
The best answer is A. Measured boot. Measured boot is a security feature that helps to protect systems from rootkits and other malware. It works by creating a cryptographic hash of all critical system components during the boot process. This hash is then stored in a trusted platform module (TPM). If any changes are detected to the critical system components, the boot process is halted and the user is alerted.
upvoted 2 times
...
guestionme
1 year, 9 months ago
I'm over this exam. A,B,& C could all be right. But it's their game and we must bow before them.
upvoted 4 times
...
above
1 year, 9 months ago
https://learn.microsoft.com/en-us/windows/security/operating-system-security/system-security/secure-the-windows-10-boot-process
upvoted 1 times
...
benni3c
1 year, 9 months ago
Very confusing, but I believe since it talks about configuring, the UEFI provides options to configure. The rest are described as processes. https://www.professormesser.com/security-plus/sy0-601/sy0-601-video/boot-integrity/
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...