Question 573 of 730 from exam SY0-601: CompTIA Security+

Question 573 of 730 from exam SY0-601: CompTIA Security+

Prev Question Next Question

Question

HOTSPOT - Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.

INSTRUCTIONS - Not all attacks and remediation actions will be used.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Hot Area:

Attack Description Target Attack Identified BEST Preventative or Remediation Action
eben mani SYN pacino We a =
Botnet Enable DDOS protection
RAT Patch vuinerable systems
Logic Bomb Disable vulnerable services
Backdoor Change the default system password
Virus Update the cryptographic algorithms
‘Spyware ‘Change the default application password
Worm Implement 2FA using push notification
Adware Conduct a code review
Ransomware Implement application fuzzing
Keylogger Implement a host-based IPS
Phishing Disable remote access services
The attack establishes a connection, which allows 4, + o
remote commands to be executed. a Bonet Fabia Dee proaciny
RAT Patch vuinerable systems
Logic Bomb Disable vulnerable services
Backdoor [Change the default system password
Virus [Update the cryptographic algorithms
Spyware [Change the default application password
Worm |Iimplement 2FA using push notification
Adware [Conduct a code review
Ransomware Implement application fuzzing
Keylogger Implement a host-based IPS
Phishing |Disable remote access services
The attack is self propagating and compromises a ( ,
‘SQL database using well-known credentials as it Database server a ~
(Botnet Enable DD6S protection
moves through the network RAT Patch vuinerable systems
[Logic Bomb Disable vulnerable services
Backdoor ‘Change the default system password
Virus Update the cryptographic algorithms
‘Spyware ‘Change the default application password
Worm Implement 2FA using push notification
Adware Conduct a code review
Ransomware Implement application fuzzing
Keylogger Implement a host-based IPS
Phishing [Disable remote access services
The attacker uses hardware to remotely monitor po ve 5 =
user's input activity to harvest credentials. [Botner ] [Enable DDOS protection
RAT Patch vulnerable systems
Logic Bomb Disable vuinerable services
Backdoor ‘Change the default system password
Virus [Update the cryptographic algorithms
‘Spyware [Change the default application password
Worm Implement 2FA using push notification
Adware [Conduct a code review
Ransomware Implement application fuzzing
Keylogger Implement a host-based IPS
Phishing Disable remote access services
The attacker embeds hidden access in an
internally developed application that bypasses Application Bonet] _[ Enable DDS protection: *
account login. RAT Patch vulnerable systems
[Logic Bomb Disable vulnerable services
[Backdoor ‘Change the default system password
Virus ‘Update the cryptographic algorithms
[Spyware ‘Change the default application password
Worm Implement 2FA using push notification
Adware Conduct a code review
Ransomware Implement application fuzzing
Keylogger Implement a host-based IPS
Phishing [Disable remote access services
Attack Description Target Attack Identified BEST Preventative or Remediation Action
‘An attacker sends multiple SYN packets from We a =
Lithia [Botnet]
RAT Patch vulnerable systems
Logic Bomb Disable vulnerable services
Backdoor Change the default system password
Virus Update the cryptographic algorithms
‘Spyware Change the default application password
Worm Implement 2FA using push notification
Adware Conduct a code review
Ransomware Implement application fuzzing
Keylogger Implement a host-based IPS
Phishing Disable remote access services
The attack establishes a connection, which allows + ERSEDDSS o
Botnet protection
remote commands to be executed pare a es
Logic Bomb Disable vulnerable services
Backdoor [Change the default system password
Virus [Update the cryptographic algorithms
Spyware [Change the default application password
Worm |Iimplement 2FA using push notification
Adware [Conduct a code review
Ransomware Implement application fuzzing
Keylogger
Phishing ‘access services
The attack is self propagating and compromises a ( =
‘SQL database using well-known credentials asi Database server. EGroy “| [Enable DDoS protection }
moves through the network RAT Patch vuinerable systems
[Logic Bomb Disable vulnerable services
Backdoor ‘Change the default system password
Virus Update the cryptographic algorithms
Spyware
Implement 2FA using push notification
JAdware Conduct a code review
Ransomware Implement application fuzzing
Keylogger Implement a host-based IPS
Phishing [Disable remote access services
The attacker uses hardware to remotely monitor po ve 5 =
user's input activity to harvest credential. [Botnet [Enable DOS protection
RAT Patch vulnerable systems
Logic Bomb
Backdoor ‘Change the default system password
Virus [Update the cryptographic algorithms
‘Spyware [Change the default application password
Worm Implement 2FA using push notification
Adware [Conduct a code review
Ransomware Implement application fuzzing
Implement a host-based IPS
Phishing Disable remote access services
The attacker embeds hidden access in an =
internally developed application that bypasses Application Bonet Enable DDoS protection
account login. RAT | Patch vulnerable systems
Disable vulnerable services
‘Change the default system password
Update the cryptographic algorithms
‘Change the default application password
uct a code review
Implement application fuzzing
Implement a host-based IPS
Phishing [Disable remote access services

Explanations

HOTSPOT - Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.

INSTRUCTIONS - Not all attacks and remediation actions will be used.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Hot Area:

Attack Description Target Attack Identified BEST Preventative or Remediation Action
eben mani SYN pacino We a =
Botnet Enable DDOS protection
RAT Patch vuinerable systems
Logic Bomb Disable vulnerable services
Backdoor Change the default system password
Virus Update the cryptographic algorithms
‘Spyware ‘Change the default application password
Worm Implement 2FA using push notification
Adware Conduct a code review
Ransomware Implement application fuzzing
Keylogger Implement a host-based IPS
Phishing Disable remote access services
The attack establishes a connection, which allows 4, + o
remote commands to be executed. a Bonet Fabia Dee proaciny
RAT Patch vuinerable systems
Logic Bomb Disable vulnerable services
Backdoor [Change the default system password
Virus [Update the cryptographic algorithms
Spyware [Change the default application password
Worm |Iimplement 2FA using push notification
Adware [Conduct a code review
Ransomware Implement application fuzzing
Keylogger Implement a host-based IPS
Phishing |Disable remote access services
The attack is self propagating and compromises a ( ,
‘SQL database using well-known credentials as it Database server a ~
(Botnet Enable DD6S protection
moves through the network RAT Patch vuinerable systems
[Logic Bomb Disable vulnerable services
Backdoor ‘Change the default system password
Virus Update the cryptographic algorithms
‘Spyware ‘Change the default application password
Worm Implement 2FA using push notification
Adware Conduct a code review
Ransomware Implement application fuzzing
Keylogger Implement a host-based IPS
Phishing [Disable remote access services
The attacker uses hardware to remotely monitor po ve 5 =
user's input activity to harvest credentials. [Botner ] [Enable DDOS protection
RAT Patch vulnerable systems
Logic Bomb Disable vuinerable services
Backdoor ‘Change the default system password
Virus [Update the cryptographic algorithms
‘Spyware [Change the default application password
Worm Implement 2FA using push notification
Adware [Conduct a code review
Ransomware Implement application fuzzing
Keylogger Implement a host-based IPS
Phishing Disable remote access services
The attacker embeds hidden access in an
internally developed application that bypasses Application Bonet] _[ Enable DDS protection: *
account login. RAT Patch vulnerable systems
[Logic Bomb Disable vulnerable services
[Backdoor ‘Change the default system password
Virus ‘Update the cryptographic algorithms
[Spyware ‘Change the default application password
Worm Implement 2FA using push notification
Adware Conduct a code review
Ransomware Implement application fuzzing
Keylogger Implement a host-based IPS
Phishing [Disable remote access services
Attack Description Target Attack Identified BEST Preventative or Remediation Action
‘An attacker sends multiple SYN packets from We a =
Lithia [Botnet]
RAT Patch vulnerable systems
Logic Bomb Disable vulnerable services
Backdoor Change the default system password
Virus Update the cryptographic algorithms
‘Spyware Change the default application password
Worm Implement 2FA using push notification
Adware Conduct a code review
Ransomware Implement application fuzzing
Keylogger Implement a host-based IPS
Phishing Disable remote access services
The attack establishes a connection, which allows + ERSEDDSS o
Botnet protection
remote commands to be executed pare a es
Logic Bomb Disable vulnerable services
Backdoor [Change the default system password
Virus [Update the cryptographic algorithms
Spyware [Change the default application password
Worm |Iimplement 2FA using push notification
Adware [Conduct a code review
Ransomware Implement application fuzzing
Keylogger
Phishing ‘access services
The attack is self propagating and compromises a ( =
‘SQL database using well-known credentials asi Database server. EGroy “| [Enable DDoS protection }
moves through the network RAT Patch vuinerable systems
[Logic Bomb Disable vulnerable services
Backdoor ‘Change the default system password
Virus Update the cryptographic algorithms
Spyware
Implement 2FA using push notification
JAdware Conduct a code review
Ransomware Implement application fuzzing
Keylogger Implement a host-based IPS
Phishing [Disable remote access services
The attacker uses hardware to remotely monitor po ve 5 =
user's input activity to harvest credential. [Botnet [Enable DOS protection
RAT Patch vulnerable systems
Logic Bomb
Backdoor ‘Change the default system password
Virus [Update the cryptographic algorithms
‘Spyware [Change the default application password
Worm Implement 2FA using push notification
Adware [Conduct a code review
Ransomware Implement application fuzzing
Implement a host-based IPS
Phishing Disable remote access services
The attacker embeds hidden access in an =
internally developed application that bypasses Application Bonet Enable DDoS protection
account login. RAT | Patch vulnerable systems
Disable vulnerable services
‘Change the default system password
Update the cryptographic algorithms
‘Change the default application password
uct a code review
Implement application fuzzing
Implement a host-based IPS
Phishing [Disable remote access services