exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 391 discussion

Actual exam question from CompTIA's SY0-701
Question #: 391
Topic #: 1
[All SY0-701 Questions]

A security analyst attempts to start a company's database server. When the server starts, the analyst receives an error message indicating the database server did not pass authentication. After reviewing and testing the system, the analyst receives confirmation that the server has been compromised and that attackers have redirected all outgoing database traffic to a server under their control. Which of the following MITRE ATT&CK techniques did the attacker most likely use to redirect database traffic?

  • A. Browser extension
  • B. Process injection
  • C. Valid accounts
  • D. Escape to host
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jbmac
1 week, 5 days ago
Selected Answer: C
The correct answer is: C. Valid accounts Explanation: The MITRE ATT&CK technique "Valid accounts" refers to the use of legitimate credentials (whether obtained through phishing, brute force, or other means) to gain unauthorized access to systems and services. In this case, the attacker likely leveraged valid credentials to compromise the database server and redirect outgoing traffic to a server they control. This technique involves using accounts that are already authorized to bypass security mechanisms and perform malicious actions without raising alarms.
upvoted 3 times
...
laternak26
2 weeks, 3 days ago
Selected Answer: B
Process injection is a technique where an attacker injects malicious code into a legitimate process to evade detection or alter the behavior of that process. In this case, the attackers could have injected code into a legitimate database process to redirect the database traffic. NOT C. Valid accounts because it is not even MITRE Technique. D. Espace to host means escaping from VM to Host not redirecting network traffic.
upvoted 3 times
Eracle
2 days, 1 hour ago
It's wrong, valid accounts is in mitre ATT&CK!
upvoted 1 times
...
...
ProudFather
3 weeks, 4 days ago
Selected Answer: D
An escape to host attack allows an attacker to break out of a sandboxed environment, such as a virtual machine or container, and gain access to the underlying host system. In this case, the attacker likely exploited a vulnerability in the database server's software or configuration to escape its security constraints and redirect network traffic.
upvoted 1 times
...
Exam_Prep221
3 weeks, 6 days ago
Selected Answer: C
Why not the others? A. Browser extension: This technique is used to manipulate or spy on browser-based activity. It does not apply to redirecting database traffic or compromising a database server. B. Process injection: This technique involves injecting malicious code into legitimate processes. While it can evade detection or escalate privileges, it does not directly explain how traffic was redirected. D. Escape to host: This technique applies to virtualized environments (e.g., escaping from a guest VM to the host system) and is unrelated to database traffic redirection.
upvoted 1 times
...
Exam_Prep221
3 weeks, 6 days ago
Selected Answer: C
The attackers were able to redirect outgoing database traffic to a server they control, which strongly indicates that they had legitimate credentials or valid accounts to access and manipulate the database server or network configurations. The Valid Accounts technique (T1078 in MITRE ATT&CK) involves an attacker obtaining and using legitimate credentials to bypass authentication and gain access to systems, servers, or services. In this scenario: The error message suggests authentication failure, implying that attackers used valid credentials to reconfigure the server or its network settings. They likely set up traffic redirection (e.g., via configuration changes or tunneling) to exfiltrate data or reroute traffic to a malicious server under their control.
upvoted 1 times
...
cda26aa
1 month, 2 weeks ago
The MITRE ATT&CK technique most likely used by the attacker to redirect database traffic is B. Process injection. Here's why: Process injection involves injecting malicious code into a legitimate process, allowing the attacker to manipulate the process and redirect traffic without being detected by the operating system2. This technique can be used to intercept and redirect database traffic to a server under the attacker's control. Other options like browser extension, valid accounts, and escape to host are less likely to be directly involved in redirecting database traffic in this scenario.
upvoted 4 times
...
srtysrhtyjumnuyedt
1 month, 3 weeks ago
Selected Answer: D
D is correct. According to the MITRE ATT&CK framework: "Escape to Host Adversaries may break out of a container to gain access to the underlying host. This can allow an adversary access to other containerized resources from the host level or to the host itself. In principle, containerized resources should provide a clear separation of application functionality and be isolated from the host environment. [...] Gaining access to the host may provide the adversary with the opportunity to achieve follow-on objectives, such as establishing persistence, moving laterally within the environment, accessing other containers running on the host, or setting up a command and control channel on the host."
upvoted 1 times
...
b82faaf
1 month, 3 weeks ago
Selected Answer: C
Valid accounts is a MITRE ATT&CK technique used in this case.
upvoted 2 times
...
jacobtriestech
1 month, 3 weeks ago
Selected Answer: D
Escape to host is a technique where an attacker gains unauthorized access to a system and then pivots to other systems within the network. In this case, the attacker gained access to the database server and then redirected its traffic to a controlled server. This indicates a successful escape to host.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago