exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 361 discussion

Actual exam question from CompTIA's SY0-501
Question #: 361
Topic #: 1
[All SY0-501 Questions]

Which of the following BEST describes a network-based attack that can allow an attacker to take full control of a vulnerable host?

  • A. Remote exploit
  • B. Amplification
  • C. Sniffing
  • D. Man-in-the-middle
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
vaxakaw829
4 years, 9 months ago
An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service (DoS or related DDoS) attack. … A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system. … (https://en.wikipedia.org/wiki/Exploit_(computer_security)#Types)
upvoted 4 times
...
Elb
5 years, 3 months ago
one more type of Network Attacks:" Sniffer Attack. A. Remote exploit Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches the highest administrative level (often called "root"). After an exploit is made known to the authors of the affected software, the vulnerability is often fixed through a patch and the exploit becomes unusable
upvoted 3 times
...
Elb
5 years, 3 months ago
Common Types of Network Attacks Eavesdropping. ... Data Modification. ... Identity Spoofing (IP Address Spoofing) ... Password-Based Attacks. ... Denial-of-Service Attack. ... Man-in-the-Middle Attack. ... Compromised-Key Attack. ...
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago