exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 867 discussion

Actual exam question from CompTIA's SY0-501
Question #: 867
Topic #: 1
[All SY0-501 Questions]

The CSIRT is reviewing the lessons learned from a recent incident. A worm was able to spread unhindered throughout the network and infect a large number of computers and server. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?

  • A. Install a NIDS device at the boundary.
  • B. Segment the network with firewalls.
  • C. Update all antivirus signatures daily.
  • D. Implement application blacklisting.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
CoRell
Highly Voted 4 years, 8 months ago
B. To MITIGATE these threats in the future, a firewall can help. A. Would only "detect" not mitigate. C. Would only "detect" not mitigate. D. Blacklisting is never a good security practice (as opposed to whitelisting), because it's hard to stay on top of all factors that would need to be blacklisted.
upvoted 18 times
Max_DeJaV
4 years, 8 months ago
C could also be right. If the AV is updated with last signatures, will detect new woms and mitigate the risk (if not zero day). But in this case B is a good practice.
upvoted 2 times
Drui
4 years, 8 months ago
the key is that it was able to spread unhindered throughout the network, otherwise the answer will be C
upvoted 3 times
...
...
...
maxdamage
Highly Voted 4 years, 7 months ago
The problem of a virus spreading within a network is NOT going to be stopped by a firewall. You don't have firewalls that restrict traffic between VLANs, but routers or layer3 switches, which have no knowledge of application-level executables like viruses. A firewall can help with perimeter defense against viruses but only if it's a UTM device capable of AV scanning. So we're still required to mitigate a virus threat by using an AV. And since we don't have the AV-on-UTM option, we're left with the AV-on-workstations solutions. C is the right answer.
upvoted 7 times
...
thisguyfucks
Most Recent 2 years ago
B. Segment the network with firewalls would be the BEST recommendation to mitigate the impacts of a similar incident in the future. Segmenting the network with firewalls creates smaller network segments that can be isolated in the event of an incident, preventing a worm from spreading throughout the entire network. This can limit the scope of an incident and prevent the damage from being widespread. While installing a NIDS device at the boundary and updating all antivirus signatures daily are also good practices, they are not as effective at preventing the spread of a worm throughout a network as segmenting the network with firewalls. Implementing application blacklisting can help to prevent certain applications from running on the network, but it is not a comprehensive solution to prevent the spread of a worm.
upvoted 1 times
...
thisguyfucks
2 years ago
Selected Answer: B
B. Segment the network with firewalls would be the BEST recommendation to mitigate the impacts of a similar incident in the future. Segmenting the network with firewalls creates smaller network segments that can be isolated in the event of an incident, preventing a worm from spreading throughout the entire network. This can limit the scope of an incident and prevent the damage from being widespread. While installing a NIDS device at the boundary and updating all antivirus signatures daily are also good practices, they are not as effective at preventing the spread of a worm throughout a network as segmenting the network with firewalls. Implementing application blacklisting can help to prevent certain applications from running on the network, but it is not a comprehensive solution to prevent the spread of a worm.
upvoted 1 times
...
SophyQueenCR82
2 years, 1 month ago
b--For example, when new worms infect Internet servers and then try to spread to other Internet servers, the connections must pass through an organization’s firewall. The network administrator who monitors the firewall is the first to notice and report these worm outbreaks. The administrator will notice hundreds of denied connections to servers on the network, as the firewall is blocking these connections from entering. DoS attacks are also detected in a similar manner.
upvoted 1 times
...
yilka
2 years, 10 months ago
since it defines the case as unhindered (not detected or stopped) so it was able to spread. Based on this we could prioritize the daily update of the signatures. Segmentation is also fine but since CSIRT member is subject to act, AV signature daily update more reasonable.
upvoted 1 times
...
copeichina
3 years, 1 month ago
The answer is C. Remember this Antivirus software detects and removes malware, such as viruses, Trojans, and worms. Signature-based antivirus software detects known malware based on signature definitions. Heuristic-based software detects previously unknown malware based on behavior. Malware developers regularly release new viruses, so it’s essential to update signature definition files regularly. Most antivirus software includes the ability to automate the process of checking and downloading updated signature definition files. They typically check for updates several times a day. From Darril Gibson's study Guide
upvoted 1 times
...
fonka
3 years, 9 months ago
The given answer is right because the objective is to limit the damage.zone when incident occurred. Updating ant virus is a good practice, but big companies having excellent antivirus are still being affected by cyber criminals so the question is inrested to focus how to limit the damage Firewall segmentation: Firewalls are deployed inside a network or data center to create internal zones to segment functional areas from each other in order to limit attack surfaces, thereby preventing threats from spreading beyond a zone. An example could be separating engineering applications from finance.
upvoted 1 times
...
yeaggie
4 years ago
Segmenting networks is done VLANS
upvoted 1 times
...
yeaggie
4 years ago
Has to be C. Update all antivirus signatures daily.
upvoted 1 times
...
b4ssey
4 years, 4 months ago
The catch is "spread unhindered throughout the network". A=>Detects B=>Correct C=>Precautions on the System D=>How many applications would you blacklist?
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago