exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 101 discussion

Actual exam question from CompTIA's SY0-701
Question #: 101
Topic #: 1
[All SY0-701 Questions]

After reviewing the following vulnerability scanning report:

A security analyst performs the following test:

Which of the following would the security analyst conclude for this reported vulnerability?

  • A. It is a false positive.
  • B. A rescan is required.
  • C. It is considered noise.
  • D. Compensating controls exist.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mr_reyes
Highly Voted 6 months, 3 weeks ago
Selected Answer: A
False Positive: A false positive occurs when a vulnerability scanner incorrectly identifies a vulnerability that doesn’t actually exist. In this case, the initial vulnerability report flagged the use of an insecure network protocol (Telnet) on the server at 192.168.14.6. However, the follow-up test using Nmap with the telnet-encryption script revealed that the Telnet server supports encryption. Since encryption enhances security, the initial report was incorrect. Therefore, the conclusion is that the initial report was a false positive.
upvoted 11 times
a4e15bd
4 months, 2 weeks ago
Telnet itself is inherently insecure and it transmits data including passwords in plaintext making it vulnerable to interception and eavesdropping. While using encryption with telnet is not typical but it is possible, however there are other secure alternatives out there like SSH. So while it is true that Telnet is an unsecure protocol, having encryption is just a compensating control here. So the answer is D.
upvoted 12 times
420JhonnySins69
3 months ago
Option D is the more reasonable. Compensating controls. is a secondary/supporting security control that prevents the vulnerability from being exploited. (encryption in this case) False Positive: believes that there's a vulnerability but when physically checked is not there. (Telnet is being used, the vulnerability of plain text is there.) False positive https://youtu.be/EJL0h4u871w?list=PL7XJSuT7Dq_UDJgYoQGIW9viwM5hc4C7n&t=6652 Objective (4.3 Explain various activities associated with vulnerability management) https://youtu.be/EJL0h4u871w?list=PL7XJSuT7Dq_UDJgYoQGIW9viwM5hc4C7n&t=7199
upvoted 6 times
...
...
...
dbrowndiver
Highly Voted 4 months, 1 week ago
Selected Answer: A
Why This Is a False Positive: 1. Understanding Telnet: General Security Issues: Telnet typically transmits data in plaintext, making it susceptible to eavesdropping and other security vulnerabilities. This is why it is often flagged in security scans. 2. Encryption Support: Security Enhancement: The presence of encryption changes the security profile of Telnet. If encryption is supported and properly implemented, the transmission of data is secure, counteracting the usual vulnerabilities associated with Telnet. 3. Initial Assessment: Misinterpretation: The initial report indicated a vulnerability due to a general assumption that Telnet is insecure, without verifying the specific configuration that includes encryption. 4. Conclusion: False Positive: Since the Telnet server supports encryption, the assumption of insecurity was incorrect. The vulnerability scanner flagged an issue based on typical characteristics rather than the actual configuration of this specific Telnet implementation.
upvoted 5 times
...
Fagann
Most Recent 14 hours, 46 minutes ago
Selected Answer: A
The vulnerability scanning report initially flags the Telnet service as using an insecure protocol. Traditionally, Telnet sends data, including credentials, in cleartext, which makes it inherently insecure when compared to encrypted protocols like SSH. However, the security analyst's follow-up test using Nmap with the --script telnet-encryption option reveals that the Telnet server actually supports encryption. This means that the Telnet service in question is not transmitting data in cleartext as a standard Telnet service would. So clearly it is false positive.
upvoted 1 times
...
Find24
2 weeks, 2 days ago
Selected Answer: A
I thought D at first but now I believe it is A and here is why. The scan just picks up on Telnet which is not secure. The command ...telnet-encryption, was ran to see if encryption was enabled. It is enabled so therefore it is secure. The analyst didn't enable it or change anything but is now aware that it is safe and therefore a false positive.
upvoted 1 times
...
dC_Furious
4 weeks ago
Selected Answer: D
I think Compensating Control exist might acrually be the right answear, the Vulnerability scan has correctly identified the vulnerability in this case, port 23 is open, the fact that there is a compensating control doesn't make it a false positive. What do you think?
upvoted 1 times
...
3dk1
1 month ago
Selected Answer: A
Yes, compensating controls probably do exist here, however, the end result is that it IS a false positive.
upvoted 1 times
...
BevMe
1 month ago
Selected Answer: D
I think D may be the better answer. The presence of a Telnet server, even with support for encryption, indicates a vulnerability due to the potential risks associated with using Telnet in general. While the encryption feature provides a compensating control, it does not negate the fact that using Telnet is inherently less secure compared to alternatives like SSH.
upvoted 1 times
...
Netri
1 month, 3 weeks ago
Selected Answer: A
The security analyst would most likely conclude: A. It is a false positive. Explanation: The vulnerability report flagged the Telnet service as insecure because Telnet traditionally uses unencrypted communication, which is considered insecure. However, the analyst performed a manual test using Nmap and discovered that the Telnet server supports encryption, which contradicts the original report. Since the service supports encryption, the vulnerability related to insecure communication (typically associated with Telnet) is not valid, meaning the original finding in the report is incorrect. Thus, this situation represents a false positive.
upvoted 1 times
...
AriGarcia
2 months, 1 week ago
A) It's a false positive Here's why: The vulnerability report initially flagged the use of an insecure network protocol, Telnet, which by default does not support encryption. However, the analyst performed an Nmap scan using the telnet-encryption script, which showed that the Telnet server does support encryption. Thus, since encryption is supported, the vulnerability flagged as "insecure" can be considered a false positive because the Telnet server is using secure practices.
upvoted 1 times
...
Ty13
2 months, 2 weeks ago
Selected Answer: A
Another garbage question. It's technically a false positive BECAUSE compensating controls exist.
upvoted 2 times
...
Twphill
3 months ago
Selected Answer: D
It is not a false positive because it correctly identified a vulnerability. However, compensating controls exist to mitigate this vulnerability.
upvoted 2 times
...
Dakshdabas
3 months, 2 weeks ago
Selected Answer: B
B. Rescan is required In pointing out that the nmap scan result shows that the Telnet server "supports encryption," but it does not confirm that encryption is actively being used. It simply indicates that the server has the capability to support encryption, but whether or not it's actually enforced during connections is another matter. Given this clarification, the best course of action for the security analyst would likely be B. A rescan is required. Explanation: Since the scan result only shows that the Telnet server supports encryption, but does not confirm that encryption is enforced, a rescan or further testing should be conducted to determine whether: Encryption is actually being used for all Telnet sessions. There is a configuration issue where encryption is supported but not enforced. The rescan should focus on verifying if encryption is mandatory for Telnet connections. If it's not, the vulnerability remains valid and should be addressed.
upvoted 1 times
...
nyyankee718
3 months, 2 weeks ago
Selected Answer: D
"supports encryption"
upvoted 1 times
...
a4e15bd
3 months, 4 weeks ago
I am going to change my answer to A. False positive, because the initial report flagged Telnet as insecure, but the subsequent test showed that encryption which addresses the vulnerability is being used. This indicates the vulnerability was incorrectly reported. So, that makes it a false positive.
upvoted 2 times
...
scoobysnack209
4 months ago
The answer is D: Disable port 23 Telnet (unencrypted) and enable SSH port 22 (encrypted connection)
upvoted 1 times
...
EfaChux
4 months, 1 week ago
Selected Answer: D
Telnet supports encryption but its currently not encrypted, which means there's a vulnerability. Hence there needs to be compensating controls. D is the answer
upvoted 2 times
...
Etc_Shadow28000
6 months ago
Selected Answer: A
A. It is a false positive. The initial vulnerability scan reported that the use of Telnet (an insecure network protocol) is a high severity issue. However, the follow-up nmap scan with the `telnet-encryption` script shows that the Telnet server supports encryption. Given that Telnet is typically insecure due to lack of encryption, the presence of encryption support indicates that the reported vulnerability might not be accurate. Therefore, the security analyst would conclude that the reported vulnerability is a false positive.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago