ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 560 - SY0-601 discussion

Report
Export

A security analyst it investigating an incident to determine what an attacker was able to do on a compromised Laptop. The analyst reviews the following SIEM log:

Which of the following describes the method that was used to compromise the laptop?

A.
An attacker was able to move laterally from PC 1 to PC2 using a pass-the-hash attach
Answers
A.
An attacker was able to move laterally from PC 1 to PC2 using a pass-the-hash attach
B.
An attacker was able to bypass the application approve list by emailing a spreadsheet. attachment with an embedded PowerShell in the file.
Answers
B.
An attacker was able to bypass the application approve list by emailing a spreadsheet. attachment with an embedded PowerShell in the file.
C.
An attacker was able to install malware to the CAasdf234 folder and use it to gain administrator rights and launch Outlook
Answers
C.
An attacker was able to install malware to the CAasdf234 folder and use it to gain administrator rights and launch Outlook
D.
An attacker was able to phish user credentials successfully from an Outlook user profile
Answers
D.
An attacker was able to phish user credentials successfully from an Outlook user profile
Suggested answer: B

Explanation:

The SIEM log shows that the user opened an email attachment named "Invoice.xlsx" and then executed a PowerShell script that downloaded and ran a malicious file from a remote server. This indicates that the attacker was able to bypass the application approve list by emailing a spreadsheet attachment with an embedded PowerShell in the file. This is a common technique used by malware authors to evade detection and deliver their payloads1.

asked 02/10/2024
Michael Bodine
28 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first