exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 279 discussion

Actual exam question from CompTIA's SY0-701
Question #: 279
Topic #: 1
[All SY0-701 Questions]

During a penetration test, a flaw in the internal PKI was exploited to gain domain administrator rights using specially crafted certificates. Which of the following remediation tasks should be completed as part of the cleanup phase?

  • A. Updating the CRL
  • B. Patching the CA
  • C. Changing passwords
  • D. Implementing SOAR
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
baronvon
Highly Voted 4 months, 2 weeks ago
Selected Answer: B
B. Patching the CA Here's why: Patching the Certificate Authorities: This involves updating the CA software to address the specific vulnerability that was exploited. Since the attack exploited a flaw in the PKI, patching the CA is crucial to fixing the vulnerability and preventing similar attacks in the future. While the other options are also important in a broader security context, they may not directly address the specific issue with the PKI flaw: -Updating the Certificate Revocation Lists (CRLs): This is important for managing revoked certificates but may not address the root cause of the PKI vulnerability. -Changing passwords: This is a good security practice but would not resolve the underlying issue with the PKI vulnerability. -Implementing SOAR (Security Orchestration, Automation, and Response): SOAR can help with automating responses and managing security operations but does not directly address the specific PKI vulnerability. -Therefore, patching the Certificate Authorities is the most effective and direct remediation task for this situatio
upvoted 9 times
...
Ty13
Highly Voted 3 months, 2 weeks ago
Selected Answer: A
A. Updating the CRL It's a really bad question because you would do BOTH A and B. The only reason I'm saying A is because the question specifically says "cleanup phase". Patching the CA would TECHNICALLY fall under the Eradication Phase - we're eradicating a threat (patching a vulnerable CA server) - and then cleanup would be updating the CRL.
upvoted 6 times
1798e2e
2 months, 3 weeks ago
patching the CA is not part of the eradication phase. it is part of the clean up. The part where you update things that are... out of date...
upvoted 1 times
...
...
ramzie
Most Recent 1 day, 15 hours ago
Selected Answer: A
Answer is A Update the CRL because Immediately invalidates compromised certificates Prevents further use of malicious certificates Blocks certificate-based authentication attempts Part of proper PKI hygiene after compromise WHy not B Patching the CA Important but secondary to immediate threat Doesn't address already issued certificates Long-term solution rather than immediate cleanup Doesn't stop current compromise
upvoted 1 times
...
laternak26
2 weeks, 4 days ago
Selected Answer: B
B. Patching the CA: The flaw in the internal Public Key Infrastructure (PKI) was exploited during the penetration test to gain domain administrator rights, which indicates a vulnerability within the Certificate Authority (CA) system. To prevent similar attacks in the future, the CA should be patched to fix any identified vulnerabilities in the certificate issuance process. This is a critical step in remediating the flaw and securing the PKI system against further exploitation. Why NOT: A. Updating the CRL (Certificate Revocation List): While updating the CRL is important to revoke any compromised or malicious certificates, it addresses only the symptom (the specific certificates) rather than the root cause (the vulnerability in the CA). The flaw that allowed for the exploitation needs to be patched first, as it could enable the attacker to issue more certificates in the future.
upvoted 2 times
...
AndyK2
1 month, 1 week ago
Selected Answer: B
B. Patching the CA
upvoted 1 times
...
MikelMiguel
1 month, 1 week ago
Selected Answer: B
The cleanup phase in a penetration test refers to the steps taken after the test has been completed to ensure that any changes made during the testing process are reversed, and the environment is restored to its original state. This phase ensures that no trace of the penetration test remains and that any potential security risks introduced during the test are mitigated. In the context of the remediation task in question, the cleanup phase focuses on fixing the vulnerabilities exploited during the penetration test and ensuring the security of the system moving forward. For example, patching the Certification Authority (CA) if it was the root cause of the domain administrator privilege escalation would be a critical task during this phase.
upvoted 1 times
...
fmeox567
1 month, 2 weeks ago
Selected Answer: B
The correct answer is: B. Patching the CA GPT
upvoted 1 times
...
cyberWoof
2 months ago
Selected Answer: A
Updating the CRL
upvoted 1 times
...
Emmyrajj
2 months ago
Selected Answer: A
The correct answer is: A. Updating the CRL (Certificate Revocation List) Explanation: When a flaw in the PKI (Public Key Infrastructure) is exploited, especially involving malicious or compromised certificates, the first step in remediation is to revoke the affected certificates to prevent further misuse. This is done by updating the Certificate Revocation List (CRL) or using Online Certificate Status Protocol (OCSP). This ensures that any certificate used in the attack is marked as invalid, mitigating the risk of continued exploitation.
upvoted 1 times
...
9ef4a35
2 months, 1 week ago
A. Updating the CRL
upvoted 1 times
...
Murtuza
2 months, 3 weeks ago
Selected Answer: B
Patching the CA
upvoted 1 times
...
User92
3 months, 1 week ago
Selected Answer: B
Updating the CRL is also important, but it primarily deals with revoking compromised certificates rather than fixing the underlying vulnerability.
upvoted 1 times
...
tamdod
4 months, 2 weeks ago
This occurred during a penetration test. We should patch the CA first to prevent further exploitation, that ensures no new certificates can be issued using the same flaw. The we would update the CRL.
upvoted 2 times
...
TrebleSmith
4 months, 3 weeks ago
Selected Answer: A
While patching the Certificate Authority is important to prevent a similar attack in the future, I believe that updating the Certificate Revocation List will apply more directly to the clean-up phase.
upvoted 3 times
...
suleman1000
4 months, 3 weeks ago
Selected Answer: B
B: Patching the CA
upvoted 1 times
...
salahsami2002
4 months, 3 weeks ago
B. Patching the CA (Certificate Authority) Since the flaw in the internal Public Key Infrastructure (PKI) was exploited to gain domain administrator rights, the primary remediation task should be to patch the Certificate Authority (CA). This will address the vulnerability that allowed the exploitation of the PKI system. Other tasks like updating the Certificate Revocation List (CRL) may be necessary, but patching the CA will directly resolve the issue that led to the compromise.
upvoted 1 times
...
a4e15bd
5 months ago
A. Update the CRL is correct The first priority is to revoke any compromise certificates. This ensures that those certificates can no longer be used for unauthorized access.
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago