exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 334 discussion

Actual exam question from CompTIA's SY0-701
Question #: 334
Topic #: 1
[All SY0-701 Questions]

Which of the following techniques would attract the attention of a malicious attacker in an insider threat scenario?

  • A. Creating a false text file in /docs/salaries
  • B. Setting weak passwords in /etc/shadow
  • C. Scheduling vulnerable jobs in /etc/crontab
  • D. Adding a fake account to /etc/passwd
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jbmac
1 week, 1 day ago
Selected Answer: B
The correct answer is: B. Setting weak passwords in /etc/shadow Explanation: In an insider threat scenario, one of the most likely techniques to attract the attention of a malicious attacker is setting weak passwords in the /etc/shadow file. This file stores password hashes for user accounts, and if an insider sets weak passwords, attackers can potentially crack these passwords through brute force or other methods. Once an attacker has access to weak passwords, they can escalate privileges, access sensitive information, or exploit the system for malicious purposes.
upvoted 1 times
...
laternak26
1 week, 5 days ago
Selected Answer: A
Creating a false text file in /docs/salaries attracts insiders, which usually looking for sensitive information.
upvoted 2 times
...
Kokoh23
2 weeks, 4 days ago
Selected Answer: A
This question is from a security operations prospective and focuses on how to catch an insider threat. #1 Never set a weak password. This could be exploited by an actual External Malicious actor. #2 Its the decoy file (A.k.a) Honey file principle. Using fake files that are highly monitored to see which accounts engage with them. Subsequently launching an investigation as to why that person was accessing the file. (Create a false text file)
upvoted 1 times
...
ec80b38
3 weeks, 6 days ago
Selected Answer: B
In an insider threat scenario, setting weak passwords in the system's password file (/etc/shadow) would be particularly attractive to a malicious attacker because:
upvoted 1 times
...
AndyK2
4 weeks ago
Selected Answer: B
In an insider threat scenario, setting weak passwords in the system's password file (/etc/shadow) would be particularly attractive to a malicious attacker because: Weak passwords create an easy entry point for unauthorized access It provides a method of persistent system compromise The action can be done subtly without immediate detection Weak passwords can potentially be used to escalate privileges It exploits inherent system authentication mechanisms
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago