exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 530 discussion

Actual exam question from CompTIA's SY0-601
Question #: 530
Topic #: 1
[All SY0-601 Questions]

A backdoor was detected on the containerized application environment. The investigation detected that a zero-day vulnerability was introduced when the latest container image version was downloaded from a public registry. Which of the following is the best solution to prevent this type of incident from occurring again?

  • A. Enforce the use of a controlled trusted source of container images.
  • B. Deploy an IPS solution capable of detecting signatures of attacks targeting containers.
  • C. Define a vulnerability scan to assess container images before being introduced on the environment.
  • D. Create a dedicated VPC for the containerized environment.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ApplebeesWaiter1122
Highly Voted 1 year, 5 months ago
Selected Answer: A
Enforcing the use of a controlled and trusted source of container images is the best solution to prevent incidents like the one described. When using containerized applications, it is crucial to ensure that the container images come from trusted sources, such as a private container registry, where the images are scanned for vulnerabilities and controlled by the organization. This way, the risk of downloading images with zero-day vulnerabilities or other malicious code from public registries is minimized.
upvoted 10 times
BD69
9 months ago
Won't help for Zero-Day attacks.
upvoted 1 times
...
...
Dapsie
Most Recent 5 months, 3 weeks ago
For those choosing B, how does a zero-day attack have a known signature??
upvoted 1 times
...
jkalfo
5 months, 3 weeks ago
this is such a weird question . just because you get it from a trusted source doesnt mean it wont have zero day vulnerabilities. it says prevent , that wont prevent because you wont know, the point of a zero day attack is that nobody knows until it happens ?
upvoted 1 times
...
shuny
5 months, 3 weeks ago
I personally think A-C won’t help against a zero day. D. At least it is segmented more from the network & less likely for threat actors to leverage any vulnerabilities they can find.
upvoted 1 times
...
Dapsie
6 months, 2 weeks ago
I am voting for option A.
upvoted 1 times
...
lilcheesecake
7 months, 4 weeks ago
Selected Answer: B
You want to prevent this from happening again not minimize the risk. You cant protect against zero-day vulnerabilities so the only way is to install IPS to detect and prevent against malicious code.
upvoted 2 times
JasonMunoz
5 months, 2 weeks ago
How would the IPS know if a zero-day attack was happening? The IPS uses established signatures of known exploits. And we all know zero-day attacks are UNKOWN
upvoted 1 times
...
...
MortG7
8 months, 3 weeks ago
For whomever selected C....two hyphenated words "zero-day". Answer is A.
upvoted 1 times
...
BD69
9 months ago
Selected Answer: B
Normally, I would select A as the answer, however, the mention of "Zero-Day" means that any trusted source would not have a defense against the vulnerability! C wouldn't really work, either, since, as above it's a "Zero-Day" problem - how can you define a scan for something you have no info on? D won;t work, either. If you have an IPS solution that works with heuristics and/or AI, you can detect Zero Day attacks and prevent them.
upvoted 1 times
...
Ga2024
9 months, 4 weeks ago
Those for A should bear in mind that not all applications from trusted sources are necessarily vulnerability-free. While obtaining applications from reputable or trusted sources can reduce the risk of encountering malicious software or intentionally harmful applications, it does not guarantee that the applications themselves are free from vulnerabilities.
upvoted 1 times
BD69
9 months ago
Not for Zero-Day attacks!
upvoted 1 times
...
...
cyberPunk28
1 year ago
Selected Answer: A
A. Enforce the use of a controlled trusted source of container images.
upvoted 1 times
...
mtnews
1 year, 5 months ago
Selected Answer: A
Going with A here
upvoted 1 times
...
Gamsje
1 year, 5 months ago
Selected Answer: A
A zero-day vulnerability can not be detected by a vulnerability scan. C is not correct. I choose A.
upvoted 2 times
BD69
9 months ago
A good IPS would detect a Zero-Day attack, if using heuristics, baselines, and AI, right?
upvoted 1 times
...
...
Irfaans91
1 year, 5 months ago
chatgpt: C. Define a vulnerability scan to assess container images before being introduced into the environment. By implementing a vulnerability scanning process for container images, the organization can identify and assess any potential security vulnerabilities or weaknesses before deploying them into the environment. This allows for proactive detection and mitigation of known vulnerabilities, reducing the risk of introducing a zero-day vulnerability or other security issues. Enforcing the use of a controlled trusted source of container images (option A) is also important to ensure the integrity and security of the images, but it may not be sufficient on its own to prevent zero-day vulnerabilities. Deploying an IPS solution (option B) capable of detecting signatures of attacks targeting containers can provide additional security measures, but it may not be effective against zero-day vulnerabilities. Creating a dedicated VPC (option D) can enhance isolation and segmentation but does not directly address the issue of vulnerability detection in container images.
upvoted 1 times
...
sander22
1 year, 5 months ago
Selected Answer: A
a verified trusted source has already been reviewed/assessed and has had a vulnerability scan. Going with A
upvoted 2 times
...
sheyshey
1 year, 5 months ago
Selected Answer: C
Should be C
upvoted 3 times
ccnaexam28
1 year, 5 months ago
How does vulnerability scan help in zero-day though? zero day means it's unknown, and it wont be detected in the scan, right?
upvoted 8 times
mtnews
1 year, 5 months ago
Yes, you are correct. Scans won't detect a zero-day attack
upvoted 2 times
...
...
david124
11 months, 2 weeks ago
Thats impossible to work because no scanner on earth can detect a zero-day
upvoted 2 times
BD69
9 months ago
A good IPS using heuristics, baselines and AI can be extremely effective on a Zero-Day attack. How would you define a vulnerability scan for a zero-day? How would a trusted source be able to do this? Answer should be B
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago