mediummultiple choiceObjective-mapped

A privileged account is used on a jump box at 02:15, and the SIEM shows multiple interactive logons from the same account to different servers within 10 minutes. The administrator says they used a password vault for the session. Which log source best confirms whether the access was authorized?

Question 1mediummultiple choice
Full question →

A privileged account is used on a jump box at 02:15, and the SIEM shows multiple interactive logons from the same account to different servers within 10 minutes. The administrator says they used a password vault for the session. Which log source best confirms whether the access was authorized?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Privileged access management or password vault audit logs

PAM logs show who checked out credentials and whether the privileged session was approved and tracked.

B

Distractor review

DHCP lease logs from the jump box subnet

DHCP logs only show address assignment and do not verify whether privileged access was authorized.

C

Distractor review

Printer server logs for the operations department

Printer logs have no meaningful connection to privileged authentication or session authorization.

D

Distractor review

Web proxy logs for outbound browsing activity

Web proxy logs may show internet access, but they do not validate privileged credential checkout or approval.

Common exam trap

Common exam trap: authentication is not authorization

Logging in proves the user can authenticate. It does not automatically mean the user is allowed to enter privileged or configuration mode. Watch for AAA authorization, privilege level and command authorization details.

Technical deep dive

How to think about this question

This kind of question is testing the difference between identity and permission. A user may successfully log in to a router because authentication is working, but still fail to enter configuration mode because authorization is missing, misconfigured or mapped to a lower privilege level.

KKey Concepts to Remember

  • Authentication checks who the user is.
  • Authorization controls what the user is allowed to do after login.
  • Privilege levels affect access to EXEC and configuration commands.
  • AAA, TACACS+ and RADIUS can separate login success from command access.

TExam Day Tips

  • Do not assume successful login means full administrative access.
  • Look for words such as cannot enter configuration mode, privilege level, authorization or command access.
  • Separate login problems from permission problems before choosing the answer.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Authentication checks who the user is.

What is the correct answer to this question?

The correct answer is: Privileged access management or password vault audit logs — Privileged access management or password vault audit logs are the best source because they record when credentials were checked out, by whom, for what session, and often whether approval workflows were followed. In a jump-box or administrative workflow, those logs directly answer whether the privileged use was expected and authorized. That makes them much more useful than generic infrastructure logs when investigating suspicious after-hours administrative activity. Why others are wrong: DHCP logs help identify network address assignment, but they do not establish authorization for privileged access. Printer logs are unrelated to authentication and would not prove anything about an admin session. Web proxy logs can show browsing behavior, yet they do not confirm credential checkout or approval in a privileged access workflow. The right evidence source is the one that tracks privileged session governance.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.