hardmulti selectObjective-mapped

A SIEM correlates the following: 17 failed logons against the same VPN account from one IP in 9 minutes, a successful login from that IP, creation of a new API token in the SaaS tenant, and a large export job started two minutes later. Which two interpretations are best supported? Select two.

Question 1hardmulti select
Full question →

A SIEM correlates the following: 17 failed logons against the same VPN account from one IP in 9 minutes, a successful login from that IP, creation of a new API token in the SaaS tenant, and a large export job started two minutes later. Which two interpretations are best supported? Select two.

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

The attacker is likely performing a brute-force password attack against a single account.

Repeated failures focused on one account from one source fit brute-force guessing against a specific target.

B

Distractor review

The pattern is most consistent with password spraying across many accounts.

Password spraying usually tries a few passwords across many accounts, not many attempts against one account.

C

Best answer

The account is likely compromised and being used for token abuse or persistence.

Successful access followed by token creation and export activity indicates the attacker gained control and is trying to retain access.

D

Distractor review

The events primarily indicate a volumetric denial-of-service attack.

The sequence is about authentication success and session abuse, not traffic saturation or service exhaustion.

E

Distractor review

Token creation proves the account password was never exposed.

Creating a token after login does not prove the password was safe; it often means the attacker already authenticated successfully.

Common exam trap

Common exam trap: NAT rules depend on direction and matching traffic

NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.

Technical deep dive

How to think about this question

NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.

KKey Concepts to Remember

  • Static NAT maps one inside address to one outside address.
  • PAT allows many inside hosts to share one public address using ports.
  • Inside local and inside global describe the private and translated addresses.
  • NAT ACLs identify traffic for translation, not always security filtering.

TExam Day Tips

  • Identify inside and outside interfaces first.
  • Check whether the scenario needs static NAT, dynamic NAT or PAT.
  • Do not confuse NAT matching ACLs with normal packet-filtering intent.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Static NAT maps one inside address to one outside address.

What is the correct answer to this question?

The correct answer is: The attacker is likely performing a brute-force password attack against a single account. — Seventeen failed logons against one account from a single IP are most consistent with an online password-guessing attack focused on that account. The successful login followed by API token creation and export activity indicates the credentials were accepted and the attacker is trying to keep access even if the password changes. That combination points to compromise plus token abuse, not network congestion or broad spray behavior. Why others are wrong: Password spraying usually spreads attempts across many accounts, not one. Denial-of-service is not the best fit because the logs center on authentication and token use rather than service exhaustion. A newly created token does not prove the password was safe; it often indicates the attacker already has valid access.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.