exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 459 discussion

Actual exam question from CompTIA's SY0-701
Question #: 459
Topic #: 1
[All SY0-701 Questions]

A malicious actor is trying to access sensitive financial information from a company's database by intercepting and reusing log-in credentials. Which of the following attacks is the malicious actor attempting?

  • A. SQL injection
  • B. On-path
  • C. Brute-force
  • D. Password spraying
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jbmac
1 week, 5 days ago
Selected Answer: B
The correct answer is: B. On-path Explanation: An on-path attack (previously known as a "man-in-the-middle" attack) involves intercepting and potentially modifying the communication between two parties without their knowledge. In this case, the malicious actor is trying to intercept the log-in credentials to reuse them and gain unauthorized access to sensitive financial information from the company's database. This type of attack typically targets the communication channel, where credentials or sensitive data are transmitted.
upvoted 3 times
...
Fagann
2 weeks, 1 day ago
Selected Answer: B
In an on-path attack (formerly known as a "man-in-the-middle" attack), the attacker intercepts communications between two parties, such as between a user and a website or service. The attacker can then capture, modify, or reuse sensitive information, like login credentials, to gain unauthorized access. This matches the scenario described, where the attacker intercepts and reuses login credentials to access sensitive financial data from the company's database. 1f2b013 Wrote this but i think he choose the wrong answer. It is surely the On-path attack.
upvoted 2 times
...
1f2b013
3 weeks, 1 day ago
Selected Answer: A
In an on-path attack (formerly known as a "man-in-the-middle" attack), the attacker intercepts communications between two parties, such as between a user and a website or service. The attacker can then capture, modify, or reuse sensitive information, like login credentials, to gain unauthorized access. This matches the scenario described, where the attacker intercepts and reuses login credentials to access sensitive financial data from the company's database.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago