exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 712 discussion

Actual exam question from CompTIA's SY0-601
Question #: 712
Topic #: 1
[All SY0-601 Questions]

Which of the following is a common source of unintentional corporate credential leakage in cloud environments?

  • A. Code repositories
  • B. Dark web
  • C. Threat feeds
  • D. State actors
  • E. Vulnerability databases
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
predsednik
Highly Voted 1 year, 6 months ago
Selected Answer: A
A. Code repositories Commonly, unintentional corporate credential leakage in cloud environments can occur through code repositories. Developers and teams often store code, configuration files, and other sensitive information in repositories like GitHub, Bitbucket, or GitLab. If these repositories are not properly secured or if sensitive data is inadvertently included in code commits, it can lead to credential exposure. Attackers might search public repositories for such information, potentially gaining unauthorized access to corporate resources. The other options (B. Dark web, C. Threat feeds, D. State actors, E. Vulnerability databases) are not typically sources of unintentional corporate credential leakage but rather relate to different aspects of cybersecurity, threat intelligence, and actors involved in cyberattacks.
upvoted 5 times
...
psowrong
Most Recent 1 year, 3 months ago
Selected Answer: A
Its def A because proper and secure coding practice is important. There would be config files that would have database url and logins or if a service is making a communication with another service and if a secure coding isn't in practice then those credentials/communications would be easily seen which makes it vulnerable.
upvoted 1 times
...
rickirikci11
1 year, 4 months ago
Why not Vulnerability databases?
upvoted 2 times
...
BlackSpider
1 year, 6 months ago
Selected Answer: A
A. Code repositories: Developers sometimes inadvertently include sensitive information, such as API keys, passwords, and other credentials, in their code. When this code is pushed to public repositories (e.g., GitHub, GitLab), those credentials can be exposed to the world, leading to potential credential leakage.
upvoted 4 times
...
Cisco103
1 year, 7 months ago
Selected Answer: A
A is correct darkweb is where we find "have I been hacked" / the question ask for the main root cause of leakage
upvoted 4 times
...
henri007
1 year, 7 months ago
Selected Answer: B
B - dark web
upvoted 2 times
Jackwasblk
1 year, 5 months ago
unintentional ...dark web would be intentional
upvoted 8 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago