ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 129 - SY0-601 discussion

Report
Export

An application owner reports suspicious activity on an internal financial application from various internal users within the past 14 days. A security analyst notices the following:

• Financial transactions were occurring during irregular time frames and outside of business hours by unauthorized users.

• Internal users in question were changing their passwords frequently during that time period.

• A jump box that several domain administrator users use to connect to remote devices was recently compromised.

• The authentication method used in the environment is NTLM. Which of the following types of attacks is MOST likely being used to gain unauthorized access?

A.
Pass-the-hash
Answers
A.
Pass-the-hash
B.
Brute-force
Answers
B.
Brute-force
C.
Directory traversal
Answers
C.
Directory traversal
D.
Replay
Answers
D.
Replay
Suggested answer: A

Explanation:

The suspicious activity reported by the application owner, combined with the recent compromise of the jump box and the use of NTLM authentication, suggests that an attacker is likely using a pass-the- hash attack to gain unauthorized access to the financial application. This type of attack involves stealing hashed passwords from memory and then using them to authenticate as the compromised user without needing to know the user's plaintext password. Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 5

asked 02/10/2024
Joan Campo
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first