exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 109 discussion

Actual exam question from CompTIA's SY0-601
Question #: 109
Topic #: 1
[All SY0-601 Questions]

While reviewing an alert that shows a malicious request on one web application, a cybersecurity analyst is alerted to a subsequent token reuse moments later on a different service using the same single sign-on method. Which of the following would BEST detect a malicious actor?

  • A. Utilizing SIEM correlation engines
  • B. Deploying Netflow at the network border
  • C. Disabling session tokens for all sites
  • D. Deploying a WAF for the web server
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 8 months ago
Selected Answer: A
I think that SIEM correlation would be the best way to detect an attacker in this case. The initial compromise was a malicious request on a web server. Moments later the token created with SSO was used on another service, the question does not specify what type of service. Deploying a WAF on the web server will detect the attacker but only on that server. If the attacker issues the same malicious request to get another SSO token correlating that event with using that SSO token in other services would allows to detect the malicious activity. Correct me if I am wrong
upvoted 52 times
hieptran
2 years, 3 months ago
I think the same with you, The token type could be varies, but I don't think that it will be detected and prevented by WAF or anything since it could be a legitimate request with stolen/hacked token. In the context of this question, it is best to collerate logs and find which system is compromised.
upvoted 3 times
...
...
Petercx
Most Recent 1 year, 4 months ago
Selected Answer: A
The best option to detect a malicious actor in this scenario would be A. Utilizing SIEM correlation engines. SIEM (Security Information and Event Management) systems provide real-time analysis of security alerts generated by applications and network hardware. They have correlation engines that can aggregate data from various sources, identify normal and abnormal activity, and detect potential security incidents such as unauthorized access or token reuse.
upvoted 1 times
...
RogerW
1 year, 7 months ago
It looks like a CSRF attack. The SIEM detected the attack and notified the user. If the question asked what would be the BEST to "protect" as opposed to "detect", I would have selected, D WAF. Since is asking what would be BEST to detect, I pick A.
upvoted 2 times
...
malibi
1 year, 7 months ago
Selected Answer: A
The question mentions about Web Application! A WAF protects your web apps by filtering, monitoring, and blocking any malicious HTTP/S traffic traveling to the web application, and prevents any unauthorized data from leaving the app.
upvoted 2 times
...
Protract8593
1 year, 9 months ago
Selected Answer: A
Utilizing SIEM (Security Information and Event Management) correlation engines would be the best way to detect a malicious actor in this scenario. SIEM systems collect and analyze log data from various sources, including web applications and network devices. By using correlation rules, the SIEM can identify patterns of behavior and detect abnormal or malicious activities that might not be apparent when analyzing each event in isolation. In the given scenario, the SIEM can correlate the alerts from the two different services that detected the subsequent token reuse. This correlation would help identify the abnormal behavior and raise an alert for further investigation by the cybersecurity analyst. SIEM systems play a crucial role in identifying complex and sophisticated attack patterns and improving incident detection and response capabilities.
upvoted 4 times
...
ApplebeesWaiter1122
1 year, 9 months ago
Selected Answer: A
SIEM (Security Information and Event Management) correlation engines are designed to collect, analyze, and correlate data from various sources across an organization's IT infrastructure. By using SIEM correlation rules, the cybersecurity analyst can identify patterns and relationships between events and data from different systems and applications. In the given scenario, the SIEM correlation engine can detect the subsequent token reuse moments after the initial malicious request on one web application. This correlation can help identify the presence of a malicious actor attempting to exploit the single sign-on method and potentially moving laterally to other services.
upvoted 1 times
...
Ahmed_aldouky
2 years, 1 month ago
Selected Answer: A
. Utilizing SIEM correlation engines would BEST detect a malicious actor. SIEM correlation engines can be used to analyze and correlate events from different systems and applications. In this case, the cybersecurity analyst can use a SIEM correlation engine to correlate the request on the web application and the subsequent token reuse on a different service. This can help to identify the malicious actor and take appropriate actions to prevent further attacks. B. Deploying Netflow at the network border can help to monitor network traffic and identify anomalies, but it may not provide enough context to detect the malicious actor in this scenario. C. Disabling session tokens for all sites is not a recommended solution as it can have negative impacts on legitimate user access. D. Deploying a WAF for the web server can help to detect and block attacks on the web application, but it may not provide enough visibility to detect the subsequent token reuse on a different service.
upvoted 2 times
...
brewoz404sd
2 years, 2 months ago
Answer is D. A waf looks specifically at session / token use, as well as monitoring all traffic between web / user. You can deploy a waf to protect ALL web apps behind it. Answer is clearly D, its exactly what a WAF is designed to do.
upvoted 2 times
...
[Removed]
2 years, 4 months ago
i still think D
upvoted 1 times
...
Gravoc
2 years, 7 months ago
SIEM correlation dashboards. From google: "It aggregates and analyzes log data from across your network applications, systems, and devices, making it possible to discover security threats and malicious patterns of behaviors that otherwise go unnoticed and can lead to compromise or data loss." Web application firewall is a good candidate, except that it will log both events into separate log files. Which can go unnoticed by security administrators, and will require additional tools to automate the process of alerting the correlated events together. Such as a SIEM.
upvoted 4 times
...
Lars87
2 years, 7 months ago
Selected Answer: A
SIEM i think correct
upvoted 1 times
...
okay123
2 years, 7 months ago
The software analyzes the log entries to identify signs of malicious activity. In addition, since the system gathers events from different sources across the network, it can recreate the timeline of an attack, enabling a company to determine the nature of the attack and its impact on the business. https://www.techtarget.com/searchsecurity/definition/security-information-and-event-management-SIEM I thought D but key word is differint devices.. so SIEM correlation i think
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago