{"id":3787,"date":"2023-12-03T18:58:06","date_gmt":"2023-12-03T18:58:06","guid":{"rendered":"https:\/\/exampracticetests.com\/c\/SY0-601\/comptia-security-sy0-601-question561\/"},"modified":"2023-12-03T18:58:06","modified_gmt":"2023-12-03T18:58:06","slug":"comptia-security-sy0-601-question561","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/c\/SY0-601\/comptia-security-sy0-601-question561\/","title":{"rendered":"CompTIA Security+ SY0-601 &#8211; Question561"},"content":{"rendered":"<div class=\"question\">An application owner reports suspicious activity on an internal financial application from various internal users<br \/>\nwithin the past 14 days. A security analyst notices the following:<br \/>\n&#8211;    Financial transactions were occurring during irregular time frames and outside of business hours by unauthorized users.<br \/>\n&#8211;    Internal users in question were changing their passwords frequently during that time period.<br \/>\n&#8211;    A jump box that several domain administrator users use to connect to remote devices was recently compromised.<br \/>\n&#8211;    The authentication method used in the environment is NTLM.<br \/>\nWhich of the following types of attacks is most likely being used to gain unauthorized access?<br \/>\n<br \/><strong><br \/>A.<\/strong> Pass-the-hash<br \/><strong>B.<\/strong> Brute-force<br \/><strong>C.<\/strong> Directory traversal<br \/><strong>D.<\/strong> Replay<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>A<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>An application owner reports suspicious activity on an internal financial application from various internal users within the past 14 days. A security analyst notices the following: &#8211; Financial transactions were occurring during irregular time frames and outside of business hours by unauthorized users. &#8211; Internal users in question were changing their passwords frequently during that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,564],"class_list":["post-3787","post","type-post","status-publish","format-standard","hentry","category-comptia-security-sy0-601","tag-comptia-security-sy0-601","tag-question-561"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts\/3787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/comments?post=3787"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts\/3787\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/media?parent=3787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/categories?post=3787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/tags?post=3787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}