ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 587 - SY0-601 discussion

Report
Export

A company uses specially configured workstations for any work that requires administrator privileges to its Tier 0 and Tier 1 systems The company follows a strict process to harden systems immediately upon delivery Even with these strict security measures in place an incident occurred from one of the workstations The root cause appears to be that the SoC was tampered with or replaced Which of the following most likely occurred?

A.
Fileless malware
Answers
A.
Fileless malware
B.
A downgrade attack
Answers
B.
A downgrade attack
C.
A supply-chain attack
Answers
C.
A supply-chain attack
D.
A logic bomb
Answers
D.
A logic bomb
E.
Misconfigured BIOS
Answers
E.
Misconfigured BIOS
Suggested answer: C

Explanation:

A supply-chain attack is a type of cyberattack that targets a trusted third-party vendor who offers services or products vital to the supply chain. A supply-chain attack can occur in software or hardware. In this case, the most likely scenario is that the SoC (system on chip) was compromised by a malicious actor before it was delivered to the company, either by tampering with or replacing it with a malicious version. This would allow the attacker to gain access to the company's systems through the specially configured workstations

asked 02/10/2024
Jason Hicks
44 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first