hardmultiple choiceObjective-mapped

Exhibit

NetFlow and Windows event excerpt:
Host: WS-22 (10.20.5.18)
14:31 10.20.5.18 -> 10.20.5.41 TCP/445
14:32 10.20.5.18 -> 10.20.5.43 TCP/5985
14:32 10.20.5.18 -> 10.20.5.47 TCP/445
14:33 10.20.5.18 -> 10.20.5.52 TCP/5985
14:34 10.20.5.18 -> 10.20.5.61 TCP/445

Security log highlights:
Event 4769 spike for user ACME\rlopez
Event 7045: Service created on 10.20.5.43 named "PSEXESVC"
Multiple hosts show remote logon type 3 from WS-22

Based on the exhibit, what is the MOST likely activity taking place on the network?

A user opened a spreadsheet shortly before unusual internal connection patterns began. The same account is now authenticating to many hosts in rapid succession.

Question 1hardmultiple choice
Full question →

Based on the exhibit, what is the MOST likely activity taking place on the network?

A user opened a spreadsheet shortly before unusual internal connection patterns began. The same account is now authenticating to many hosts in rapid succession.

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

A worm is flooding the network with broadcast traffic and exhausting bandwidth.

The logs show authenticated connections and remote service creation, not large broadcast storms or obvious denial-of-service behavior.

B

Best answer

An attacker is performing lateral movement using stolen credentials and remote administration tools.

The mix of SMB, WinRM, remote logons, Kerberos activity, and PsExec service creation is consistent with movement from one compromised workstation to multiple internal hosts.

C

Distractor review

A malicious insider is exfiltrating data through a cloud sync application.

There is no evidence of bulk uploads, cloud synchronization, or outbound internet transfer in the provided logs.

D

Distractor review

A misconfigured printer is repeatedly scanning the subnet for available services.

A printer would not normally authenticate as a user account or create remote services on multiple hosts.

Common exam trap

Common exam trap: usable hosts are not the same as total addresses

Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.

Technical deep dive

How to think about this question

Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.

KKey Concepts to Remember

  • CIDR notation defines the prefix length.
  • Block size helps identify subnet boundaries.
  • Network and broadcast addresses are not usable hosts in normal IPv4 subnets.
  • The required host count determines the smallest suitable subnet.

TExam Day Tips

  • Write the block size before choosing the subnet.
  • Check whether the question asks for hosts, subnets or a specific address range.
  • Do not confuse /24, /25, /26 and /27 host counts.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

CIDR notation defines the prefix length.

What is the correct answer to this question?

The correct answer is: An attacker is performing lateral movement using stolen credentials and remote administration tools. — The exhibit shows a classic lateral movement pattern. The workstation authenticates to many internal systems over SMB and WinRM, the same user account generates a Kerberos spike, and a remote service named PSEXESVC appears on a target host. That combination strongly suggests an attacker has valid credentials or has captured a session and is using remote administration techniques to move across the environment. The behavior is much more than simple scanning and should be treated as compromise. Why others are wrong: A worm would typically generate broad, unauthenticated propagation patterns rather than a single account authenticating to multiple systems. Data exfiltration would usually produce noticeable outbound transfer activity to external destinations, which is absent here. A printer scan is not credible because the logs show authenticated remote access, Kerberos activity, and service creation that align with attacker tradecraft rather than normal device behavior.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.