exam questions

Exam PT0-001 All Questions

View all questions & answers for the PT0-001 exam

Exam PT0-001 topic 1 question 53 discussion

Actual exam question from CompTIA's PT0-001
Question #: 53
Topic #: 1
[All PT0-001 Questions]

A penetration tester was able to retrieve the initial VPN user domain credentials by phishing a member of the IT department. Afterward, the penetration tester obtained hashes over the VPN and easily cracked them using a dictionary attack. Which of the following remediation steps should be recommended? (Select
THREE).

  • A. Mandate all employees take security awareness training.
  • B. Implement two-factor authentication for remote access.
  • C. Install an intrusion prevention system.
  • D. Increase password complexity requirements.
  • E. Install a security information event monitoring solution.
  • F. Prevent members of the IT department from interactively logging in as administrators.
  • G. Upgrade the cipher suite used for the VPN solution.
Show Suggested Answer Hide Answer
Suggested Answer: BCG 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
amankry
Highly Voted 5 years, 4 months ago
A B D is the correct answer
upvoted 26 times
...
sharifengg
Highly Voted 5 years, 4 months ago
A B D is the correct answer
upvoted 16 times
...
kloug
Most Recent 2 years, 2 months ago
bcf correct
upvoted 1 times
...
miabe
2 years, 9 months ago
Selected Answer: ABD
looks good to me
upvoted 1 times
...
GDLY
3 years ago
A B D is correct
upvoted 1 times
...
Jetlife
3 years ago
Selected Answer: ABD
Correct answer
upvoted 1 times
...
Ariel235788
3 years, 5 months ago
Im going with BCD. A will help but that doesn't stop dictionary attacks from being successful. Thus the purpose of D. BCD will address all the front issues with the pentest. Best to assume your users will be phished regardless of training/awareness. MFA should always be in place, an IPS will prevent the intrusion from occurring and prevent attacks, password complexity will assume users will be targeted and hashes stolen but prevent easily cracking with dictionary attacks. A will come later, same with E. G only addresses the VPN and nothing to do with cracking the password hashes of the end users.
upvoted 1 times
...
Ariel235788
3 years, 6 months ago
You can have the best and brightest and flashiest tools. If users are not aware of phishing then boom your whole castle crumbles.
upvoted 2 times
...
cvMikazuki
3 years, 6 months ago
diorg kata ABD. Cohort 1-2021
upvoted 3 times
...
SciBer
3 years, 6 months ago
A, B, and D. - (A), retraining is needed because employees respond to phished emails. (B), implementing 2FA would remedy any possible leaks from the phished email (i.e., RSA tokens). (D), the ciphers in this scenario were not compromised (eliminates G as an answer). So, the only logical answer is D. Which makes passwords more complex, so they would not be susceptible to dictionary attacks.
upvoted 2 times
...
phish7827
3 years, 8 months ago
The following cryptographic algorithms are used throughout the life of a TLS/SSL‑encrypted connection: Key establishment—This algorithm is used to exchange or agree on the symmetric keys to be used for encrypting and decrypting the data payload during the session. Examples: RSA, Diffie-Hellman (DH), Ephemeral Diffie-Hellman (DHE), and Elliptic Curve Diffie-Hellman (ECDH). Authentication—This algorithm is the digital signature used by the certificates passed between the client application and server. Examples: RSA and Digital Signature Standard (DSS). Encryption—This algorithm encrypts and decrypts payload passed on the secure session. Examples: RC4, 3DES CBC, and Advanced Encryption Standard (AES). Digest—This algorithm is used to maintain message integrity. Tampering with the message would render the digest invalid. Examples: SHA1, MD5. The combination of these four cryptographic algorithms is known as a cipher suite. Encryption ciphers are at the heart of VPN technology. They help determine how the secure tunnel is formed, but that has nothing to do with obtaining a hash over a VPN. I'm going ABD
upvoted 1 times
...
CybeSecN
3 years, 9 months ago
I would go for A, D, G as the CompTIA Pentest+ Practice Test, Sybex mantioned in Question 124 - Chapter 5, --- In this scenario, the tester should recommend that the client increase their password complexity requirements since the tester was able to crack them by using a dictionary attack. The tester should also recommend that all employees take security awareness training, since it was a member of the IT department who gave up pertinent information when the tester used a phishing technique. The tester should also recommend upgrading the cipher suite that is used for the VPN solution. A cipher suite is a set of algorithms that help secure network connections that uses Transport Layer Security (TLS) or Secure Socket Layer (SSL). The set of algorithms that cipher suites usually contain includes a key exchange algorithm, a bulk encryption algorithm, and a message authentication code (MAC) algorithm. ---
upvoted 4 times
...
nakres64
4 years ago
A B D is correct. Here is the key point; attacker can connect to the VPN with victim's credentials. We ensure this with two factor authentication.
upvoted 3 times
...
bzpunk
4 years, 1 month ago
Those of you arguing against the cipher suite answer don't understand VPNs. The hashes should be encrypted not available to see. If you can see the hashes, you've already broken the encryption.
upvoted 1 times
dyers
3 years, 12 months ago
What are you even talking about? They connected to the VPN using phished credentials, and then extracted domain hashes not VPN "hashes". ABD helps each problem point.
upvoted 5 times
...
...
TheThreatGuy
4 years, 3 months ago
I would say ABD. I think the argument for A&B is covered enough here. My argument for D instead of G, is the dictionary attack. Increasing the cipher doesn't defend against the dictionary attack, but creating stronger passwords would.
upvoted 2 times
...
Marlon_Franco22
4 years, 7 months ago
I would go for A & G, I'm happy for B however, authentication for remote access is bugging me. If it is authentication in email i'll go for B. Otherwhite, i'll stick with ADG
upvoted 3 times
novac1111
4 years, 7 months ago
But why D is considered an answer? If someone is tricked by a phishing attack no matter how sophisticaded is the password?
upvoted 2 times
GreyHunter
4 years, 6 months ago
There was dictionary attack involved. So you need to increase the password complexity
upvoted 2 times
...
...
...
Leonar
4 years, 9 months ago
People, Process, Technology. A - People B - Technology D - Process
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago