exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 24 discussion

Actual exam question from CompTIA's SY0-601
Question #: 24
Topic #: 1
[All SY0-601 Questions]

Which of the following describes the exploitation of an interactive process to gain access to restricted areas?

  • A. Persistence
  • B. Buffer overflow
  • C. Privilege escalation
  • D. Pharming
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
varun0
Highly Voted 2 years, 7 months ago
Selected Answer: C
exploitation of interactive process is the commandline from where exploits can be run to gain root permissions in a system
upvoted 24 times
...
NICKJONRIPPER
Highly Voted 2 years, 5 months ago
Selected Answer: B
interactive means input, gain restrict area means modify memory that not allowed to the application, this is buffer overflow. No mention to gain another account(privilege escalation).
upvoted 9 times
rikres25
11 months, 3 weeks ago
Exactly why i chose buffer overflow, when someone does a buffer overflow attack they target a specifc hardware that holds memory, forcely push more memory into that limited area so the extra memory can go to the next area and change the data, leading to expolitation.
upvoted 2 times
...
PropheticBettor
1 year, 6 months ago
I agree. No one refers to an admin account as a restricted area. Input has been used to overload and reach restricted memory
upvoted 1 times
PropheticBettor
1 year, 6 months ago
Also privilege escalation does not have to be interactive. In order to overflow the buffer you must interact with it
upvoted 2 times
...
...
NICKJONRIPPER
2 years, 5 months ago
key is gain "area", not gain "account"
upvoted 5 times
...
Dutch012
1 year, 11 months ago
Agree with ya
upvoted 1 times
...
...
f71cbb0
Most Recent 11 months, 2 weeks ago
Selected Answer: B
Restricted (memory) area. There is no such thing called restricted (account) area.
upvoted 1 times
...
rikres25
11 months, 3 weeks ago
Terrible question honestly, I dont understand what interactive process suppose to mean
upvoted 2 times
...
AspiringNerd
1 year ago
Selected Answer: C
The correct answer is C. Privilege escalation. This term refers to the act of exploiting a vulnerability or design flaw in a system to gain elevated access privileges, typically beyond what was originally intended by the system's administrators. This could involve exploiting an interactive process to gain access to restricted areas or functions within a system.
upvoted 1 times
...
russian
1 year ago
Selected Answer: C
Don't overthink, its talking about a physical area
upvoted 1 times
...
Protract8593
1 year, 9 months ago
Selected Answer: C
Privilege escalation is the process of exploiting a vulnerability or weakness in a system to gain higher-level access or privileges than the user originally had. It involves elevating one's privileges from a standard or restricted user to an administrative or superuser level. By doing so, an attacker can gain access to sensitive or restricted areas of the system, perform unauthorized actions, and potentially take control over the entire system. Privilege escalation can occur through various means, such as exploiting software vulnerabilities, misconfigurations, or weaknesses in access controls. It is a critical security concern and is often used as part of sophisticated cyberattacks to gain deeper access to a targeted system or network.
upvoted 3 times
...
ApplebeesWaiter1122
1 year, 10 months ago
Selected Answer: C
Privilege escalation is the process of elevating one's privileges or access level beyond what is initially granted. In the context of security, it typically refers to gaining higher privileges within a system or application to access restricted areas or perform unauthorized actions. Exploiting an interactive process refers to taking advantage of a running program or process to manipulate it in a way that grants higher privileges or access rights. By exploiting vulnerabilities or weaknesses in the interactive process, an attacker can escalate their privileges and gain unauthorized access to restricted areas of the system.
upvoted 2 times
...
LeonardSnart
1 year, 11 months ago
Selected Answer: C
I thought it was B at first, but after checking the book C seems to be correct. "There are a couple of ways to achieve privilege escalation. One way is to use existing privileges to perform an action that steals a better set of credentials. You can obtain “better” credentials by using sniffers to grab credentials or by getting the Windows Security Account Manager (SAM) or the Linux/Unix etc/passwd file. Another method is by exploiting vulnerabilities or weaknesses in processes that are running with escalated privileges. Injecting malicious code into these processes can also achieve escalated privilege." -All-in-one Comptia Security+ SY0-601 by Conklin, White, et al
upvoted 2 times
...
princajen
2 years, 1 month ago
Selected Answer: C
C. Privilege escalation. Privilege escalation is the exploitation of an interactive process to gain access to resources that are normally unavailable to an unauthorized user. This can occur when an attacker gains access to a low-privileged account on a system and then uses that access to escalate privileges to a higher level, allowing the attacker to perform actions they wouldn't normally be able to do. For example, an attacker might use a privilege escalation exploit to gain administrative access to a system or to gain access to sensitive data.
upvoted 4 times
...
DALLASCOWBOYS
2 years, 2 months ago
C. Privilege Escalation seeks to increase the level of access that a user normally doesn't have. A restricted access area is an increased level of access.
upvoted 1 times
...
xxxdolorxxx
2 years, 3 months ago
Selected Answer: C
Priv esc.
upvoted 1 times
...
FMMIR
2 years, 5 months ago
Selected Answer: C
With Privilege Escalation, hackers can use a NON-INTERACTIVE program (application) to gain access. Privilege escalation happens when a malicious user exploits a bug, design flaw, or configuration error in an APPLICATION (either a batch program or an interactive program) or OPERATING SYSTEM utility program to gain elevated access to resources that should normally be unavailable to that user.
upvoted 1 times
...
comeragh
2 years, 6 months ago
Selected Answer: C
Agree with C here being the correct answer
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago