exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 93 discussion

Actual exam question from CompTIA's SY0-701
Question #: 93
Topic #: 1
[All SY0-701 Questions]

A technician is opening ports on a firewall for a new system being deployed and supported by a SaaS provider. Which of the following is a risk in the new system?

  • A. Default credentials
  • B. Non-segmented network
  • C. Supply chain vendor
  • D. Vulnerable software
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Etc_Shadow28000
Highly Voted 6 months ago
Selected Answer: B
B. Non-segmented network Opening ports on a firewall for a new system introduces the risk that the new system might be deployed on a non-segmented network. This means that the new system and its traffic could potentially be exposed to other parts of the network, increasing the risk of lateral movement by an attacker if the system is compromised. Network segmentation helps in containing potential breaches and limiting access to sensitive areas of the network. Therefore, the correct answer is: B. Non-segmented network
upvoted 15 times
...
hasquaati
Highly Voted 7 months ago
Selected Answer: C
I am thinking that opening firewall ports is a Layer 3 and Layer 4 issue and not a Layer 7 vulnerability, which is where the Vulnerable software would fit in. I would be more concerned about the Cloud provider which is why I am choosing C: Supply Chain Vendor.
upvoted 10 times
...
Benny_On
Most Recent 17 hours, 37 minutes ago
Selected Answer: D
I think zero-day vulnerability on new system can be out-of-hands Cloud Provider, so i think D will be fit anwser
upvoted 1 times
Benny_On
17 hours, 28 minutes ago
Additional, be attention to key word of the question "Risk on new system"
upvoted 1 times
...
...
ProudFather
1 week, 1 day ago
Selected Answer: C
C. Supply chain vendor The primary risk in this scenario is the supply chain vendor. Since the system is a SaaS offering, the security of the underlying infrastructure and applications relies heavily on the vendor's security practices. Here's a breakdown of why the other options aren't as relevant: the most significant risk in this scenario is the potential for vulnerabilities or security breaches within the SaaS provider's infrastructure or applications.
upvoted 1 times
...
Fourgehan
1 week, 3 days ago
Selected Answer: C
When deploying and supporting a system provided by a SaaS (Software as a Service) vendor, the supply chain vendor risk becomes a primary concern. The organization is relying on the SaaS provider for security, availability, and compliance. Risks include: The SaaS provider's systems being compromised. Lack of transparency in the vendor’s security measures. Potential vulnerabilities in the SaaS platform affecting the organization. These risks emphasize the importance of vendor assessments, contractual security requirements, and regular audits
upvoted 1 times
...
Dimpo_Oz
2 weeks ago
Selected Answer: C
you are opening firewall for a third party, ie allowing a third party into your network bringing all their vulnerabilities along for the ride. Supply chain vendor by definition
upvoted 1 times
...
fmeox567
2 weeks, 2 days ago
Selected Answer: B
B. Non-segmented network GPT
upvoted 1 times
...
cyberWoof
1 month ago
Selected Answer: C
Supply chain vendor
upvoted 1 times
...
braveheart22
1 month ago
Selected Answer: C
I think C is the best choice because, since SaaS solutions are often integrated with core business functions and handle sensitive data, any vulnerabilities, breaches, or lapses in security at the vendor's end can directly impact the organization. This is a key concern in modern enterprise environments, where trust in third-party providers must be carefully managed through security assessments, vendor reviews, and contractual security requirements.
upvoted 2 times
...
deejay2
1 month, 2 weeks ago
It's C for me. Supply Chain vendor deals with the management of service providers and tampering with underlying infrastructure, which is what the question is asking.
upvoted 1 times
...
deejay2
1 month, 3 weeks ago
I'll say C. This deals with Third Party Risk Management. The third party is the Saas provider and that provider can access the network through those open ports adding their own malicious code.
upvoted 2 times
...
c7b3ff0
1 month, 4 weeks ago
Selected Answer: D
Since this specifies that it wants a risk *in the new system,* B&C are definitely not in the new system (B is an existing network, supply chain should already be analyzed). This leaves A&D. Since it's talking about opening ports in a firewall and potentially exposing this new system, it wants D, Vulnerable Software.
upvoted 1 times
...
Ty13
2 months, 1 week ago
Selected Answer: D
This is a really terrible question. It could possibly be A because the software on the new system, with ports now being opened to the internet, might have a default username/password that an attacker could exploit. But that would then mean that the software is vulnerable to those attacks to begin with.
upvoted 4 times
...
2fd1029
2 months, 1 week ago
Selected Answer: D
Given that the question specifically says "which is a risk in *the new system*" I would say that it can NOT be A or B because those are not risks with the provided system, they are risks with the corporate network in which the system is being deployed. It's a crapshoot between C & D depending on whoever wrote this vague question and decided what they wanted the answer to be. I would hazard to say D, because it most specifically relates to the system itself, and thus also the firewall ports that it will be whitelisted to communicate on.
upvoted 3 times
...
Hayder81
3 months ago
C. Supply chain vendor
upvoted 2 times
...
_denw
3 months, 1 week ago
Selected Answer: B
B. Non-segmented network
upvoted 2 times
...
850bc48
3 months, 1 week ago
Chat GPT says: When ports are opened on a firewall, it could expose the system to external threats, especially if the network is not properly segmented. A non-segmented network allows attackers who gain access to one part of the network to potentially move laterally across the network to other systems, increasing the risk of a breach. A. Default credentials: This is a common risk but is not directly related to opening firewall ports. C. Supply chain vendor: While this is an important risk, it is more related to the relationship with the SaaS provider rather than the direct consequence of opening firewall ports. D. Vulnerable software: This is another risk, but it isn't as directly tied to the act of opening ports as network segmentation is. Therefore, Non-segmented network is the most relevant risk in this context.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago