exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 540 discussion

Actual exam question from CompTIA's SY0-701
Question #: 540
Topic #: 1
[All SY0-701 Questions]

Which of the following is a reason environmental variables are a concern when reviewing potential system vulnerabilities?

  • A. The contents of environmental variables could affect the scope and impact of an exploited vulnerability.
  • B. In-memory environmental variable values can be overwritten and used by attackers to insert malicious code.
  • C. Environmental variables define cryptographic standards for the system and could create vulnerabilities if deprecated algorithms are used.
  • D. Environmental variables will determine when updates are run and could mitigate the likelihood of vulnerability exploitation.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
test_arrow
2 months, 1 week ago
Selected Answer: A
A. The contents of environmental variables could affect the scope and impact of an exploited vulnerability. Explanation: ✔ Environmental variables can hold sensitive information like API keys, passwords, and configuration settings. ✔ Attackers who exploit a vulnerability may access these variables, potentially increasing the scope and impact of the attack. For example, an attacker gaining access to these variables could leverage them to escalate privileges, pivot to other systems, or access sensitive data.
upvoted 2 times
...
dbrowndiver
2 months, 3 weeks ago
Selected Answer: A
Environmental variables store information that can affect how software operates, such as file paths, user credentials, and runtime configurations. If improperly secured, these variables could provide an attacker with sensitive information or ways to manipulate the system, increasing the scope and impact of a vulnerability. Attackers exploiting vulnerabilities may access environmental variables to obtain sensitive data (e.g., API keys, database credentials, or paths to important files) or influence program behavior. For example, attackers might alter these variables to redirect data or compromise the system. This highlights the importance of controlling and securing environmental variables as part of the overall system security posture.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago