nerdexam
CompTIACompTIA

SY0-501 · Question #402

SY0-501 Question #402: Real Exam Question with Answer & Explanation

The correct answer is A: Remote exploit. A remote exploit is a network-based attack that targets vulnerabilities in a host's software or services, allowing an attacker to gain unauthorized and often full control of the system.

Submitted by rohit_dlh· Mar 4, 2026

Question

Which of the following BEST describes a network-based attack that can allow an attacker to take full control of a vulnerable host?

Options

  • ARemote exploit
  • BAmplification
  • CSniffing
  • DMan-in-the-middle

Explanation

A remote exploit is a network-based attack that targets vulnerabilities in a host's software or services, allowing an attacker to gain unauthorized and often full control of the system.

Common mistakes.

  • B. Amplification attacks are a type of Denial-of-Service (DoS) attack where an attacker uses legitimate services to magnify traffic volume directed at a victim, aiming to overwhelm rather than gain control of a host.
  • C. Sniffing is a passive reconnaissance technique involving the capture and analysis of network traffic, primarily for information gathering, not for gaining control over a host.
  • D. A Man-in-the-Middle (MITM) attack involves an attacker intercepting and potentially altering communication between two parties, but it does not inherently provide full control over the endpoint hosts themselves.

Concept tested. Network attack types and exploit mechanisms

Reference. https://learn.microsoft.com/en-us/compliance/regulatory/offering-soc2-cyberattack-guide#common-types-of-cyberattacks

Community Discussion

No community discussion yet for this question.

Full SY0-501 PracticeBrowse All SY0-501 Questions