exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 23 discussion

Actual exam question from CompTIA's SY0-601
Question #: 23
Topic #: 1
[All SY0-601 Questions]

Which of the following are common VoIP-associated vulnerabilities? (Choose two.)

  • A. SPIM
  • B. Vishing
  • C. Hopping
  • D. Phishing
  • E. Credential harvesting
  • F. Tailgating
Show Suggested Answer Hide Answer
Suggested Answer: BE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
serginljr
Highly Voted 2 years, 7 months ago
Hopping does not exist in exam objectives
upvoted 43 times
NerdAlert
2 years ago
heads up - vlan hopping one was of the choices on my exam, but credential harvesting was not! IDK which one is correct besides vishing, but cred harvesting wasnt there.
upvoted 11 times
user82
2 years ago
So the only reason "hopping" is not the answer is because it's not in the exam objectives? So I guess it's SPIM and credential harvesting
upvoted 2 times
MENAMONGMEN
2 years ago
he just said cred harvesting is NOT on the test.. :(
upvoted 4 times
...
BlackMamba_4
1 year, 9 months ago
Spim and vishing
upvoted 14 times
...
...
...
...
k9_462
Highly Voted 2 years, 7 months ago
Selected Answer: BE
after heavy consideration and reading through multiple sec+ books, i m kinda going with B & D. vishing and credential harvesting as being the most common attacks, as hopping doesnt ever seem to come up in the material. https://fitsmallbusiness.com/voip-security-threats/
upvoted 31 times
Skimbeeble
1 year, 2 months ago
may I ask why D? considering its VOIP it would be B for sure but D is just another form of B just in a different aspect.
upvoted 1 times
...
k9_462
2 years, 7 months ago
although they dont specifically mention VOMIT, a common result of VOMIT would be credntial harvesting. "VOMIT, is a VoIP hacking technique that extracts confidential data and voice packets directly from calls. VOMIT works by eavesdropping on phone calls and converting phone conversations into files straight from your business phone system. This makes it easy to obtain company information, including usernames, passwords, bank details, phone numbers, and call origin."
upvoted 19 times
...
...
Alcpt
Most Recent 8 months ago
Selected Answer: AB
A AND B. Vlan hopping and credential harvesting are not voip specific.
upvoted 1 times
...
roukettas
9 months, 4 weeks ago
Selected Answer: BE
SPIM is for messages So B for sure and the next closer to VOIP vulnerability is the E
upvoted 1 times
...
agfencer
10 months ago
Selected Answer: BE
please tell me how you're going to Instant message a voip phone, answer can't be A.. its BE
upvoted 1 times
...
Eromons
11 months ago
Selected Answer: BE
Scammers use Voip to offer fake employment and also use it to gather datas that contains individual using SMS social engineering.
upvoted 1 times
...
GigaChungus
1 year ago
Selected Answer: BE
Copilot says B+E. Copilot: The two common VoIP-associated vulnerabilities from the options provided are: B. Vishing: Vishing, or voice phishing, is a type of attack that attempts to trick victims into giving up sensitive personal information over the phone. Since VoIP systems are essentially transmitting voice as data over IP networks, they are susceptible to the same phishing attacks that can occur in data networks. E. Credential Harvesting: VoIP systems can be vulnerable to attacks where credentials are harvested. Attackers can use various methods, such as brute force attacks or packet sniffing, to obtain user credentials. Once these credentials are obtained, attackers can gain unauthorized access to the VoIP system.
upvoted 1 times
...
shady23
1 year ago
Selected Answer: AB
SPIM (Spam over Internet Messaging) is a type of VoIP-associated vulnerability that involves sending unsolicited or fraudulent messages over an internet messaging service, such as Skype or WhatsApp. It can trick users into clicking on malicious links, downloading malware, providing personal or financial information, etc., by impersonating a legitimate entity or creating a sense of urgency or curiosity. Vishing (Voice Phishing) is a type of VoIP-associated vulnerability that involves making unsolicited or fraudulent phone calls over an internet telephony service, such as Google Voice or Vonage. It can trick users into disclosing personal or financial information, following malicious instructions, transferring money, etc., by using voice spoofing, caller ID spoofing, or interactive voice response systems.
upvoted 4 times
...
shady23
1 year ago
Selected Answer: AB
SPIM (Spam over Internet Messaging) is a type of VoIP-associated vulnerability that involves sending unsolicited or fraudulent messages over an internet messaging service, such as Skype or WhatsApp. It can trick users into clicking on malicious links, downloading malware, providing personal or financial information, etc., by impersonating a legitimate entity or creating a sense of urgency or curiosity. Vishing (Voice Phishing) is a type of VoIP-associated vulnerability that involves making unsolicited or fraudulent phone calls over an internet telephony service, such as Google Voice or Vonage. It can trick users into disclosing personal or financial information, following malicious instructions, transferring money, etc., by using voice spoofing, caller ID spoofing, or interactive voice response systems.
upvoted 4 times
...
chriseatmon25
1 year ago
B. For sure but E. is correct due to Voicemail via email attachment. The attachment may malicious code.
upvoted 1 times
...
fryderyk
1 year, 1 month ago
Selected Answer: BC
For those not convinced to Hopping (I was), one of many resources on to voip vlan hopping: https://community.broadcom.com/symantecenterprise/viewdocument/voip-hopping-a-method-of-testing?CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68 The other one just must be Vishing.
upvoted 1 times
...
JustJess
1 year, 1 month ago
SPIM (Spam over Instant Messaging) not with VoIP Vishing yes as it is voice phishing...partly why when a spammer asks you a yes or no questions,,,,its best to hang up. Cred harvisting can be exploited when you have voicemail set to be emailed to you
upvoted 1 times
...
BD69
1 year, 2 months ago
Selected Answer: BC
Only B & C answers are related to VOIP. Vishing should be obvious Hopping, not as obvious, but since putting VOIP devices on a separate network, physical or VLAN, is a recommended good practices, VLAN is susceptible to hopping.
upvoted 1 times
...
[Removed]
1 year, 2 months ago
Selected Answer: AB
SPIM falls into VoIP in Comptia's world.
upvoted 2 times
BD69
1 year, 2 months ago
Really? I'd love to see a VOIP system with IM. Never seen one before!
upvoted 1 times
BD69
1 year, 1 month ago
Forgot about cloud based VOIP - they all have IM built into their service. A & B are, indeed, the correct answer here.
upvoted 4 times
...
...
...
6809276
1 year, 2 months ago
Selected Answer: AB
Based on gather information i think it is A and B, although B and E also sound correct. I hate these questions.
upvoted 2 times
...
8c4769c
1 year, 3 months ago
Selected Answer: AB
SPIM and Vishing
upvoted 1 times
...
DrCo6991
1 year, 4 months ago
Selected Answer: AB
Vishing is an obvious choice. However, all the others are questionable. Considering what's left, I'd say SPIM is the best logical conclusion (SPIT would be better but not listed). If you agree with credential harvesting, you have to agree with Phishing because that's how Professor Messer says credential harvesting takes place (by sending a malicious attachment over email and a user clicking it). Hopping from what I looked up has to do with moving around different avenues to gain access to a system or environment. I guess it could include using the phone. However, I looked up IM over VOIP and it appears to be possible. I could be wrong though. If I get the question, I'm going with A and B on the test.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago