hardmultiple choiceObjective-mapped

Exhibit

Phishing awareness results:
Team A: click rate 8%, report rate 6%, median report time 52 min
Team B: click rate 7%, report rate 18%, median report time 14 min
Team C: click rate 12%, report rate 21%, median report time 10 min

Incident summary: Team C had one mailbox takeover after a user approved an MFA push while traveling.

Based on the exhibit, which control would most effectively reduce the remaining successful attacks?

Phishing awareness results: Team A: click rate 8%, report rate 6%, median report time 52 min Team B: click rate 7%, report rate 18%, median report time 14 min Team C: click rate 12%, report rate 21%, median report time 10 min

Incident summary: Team C had one mailbox takeover after a user approved an MFA push while traveling.

Question 1hardmultiple choice
Full question →

Based on the exhibit, which control would most effectively reduce the remaining successful attacks?

Phishing awareness results: Team A: click rate 8%, report rate 6%, median report time 52 min Team B: click rate 7%, report rate 18%, median report time 14 min Team C: click rate 12%, report rate 21%, median report time 10 min

Incident summary: Team C had one mailbox takeover after a user approved an MFA push while traveling.

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Continue generic awareness posters without changing technical controls.

Posters alone will not stop approval-based MFA abuse or other prompt fatigue attacks.

B

Best answer

Replace push-based MFA with phishing-resistant MFA and reinforce verification for unusual login prompts.

Phishing-resistant MFA blocks prompt abuse, and verification steps help users resist social engineering during abnormal sign-in events.

C

Distractor review

Disable MFA on mobile devices so users can log in faster.

Removing MFA would make account takeover much easier and would increase risk significantly.

D

Distractor review

Allow employees to approve prompts from any device to reduce help desk calls.

Loosening prompt approval would make MFA fatigue attacks easier to succeed, not harder.

Common exam trap

Common exam trap: NAT rules depend on direction and matching traffic

NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.

Technical deep dive

How to think about this question

NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.

KKey Concepts to Remember

  • Static NAT maps one inside address to one outside address.
  • PAT allows many inside hosts to share one public address using ports.
  • Inside local and inside global describe the private and translated addresses.
  • NAT ACLs identify traffic for translation, not always security filtering.

TExam Day Tips

  • Identify inside and outside interfaces first.
  • Check whether the scenario needs static NAT, dynamic NAT or PAT.
  • Do not confuse NAT matching ACLs with normal packet-filtering intent.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Static NAT maps one inside address to one outside address.

What is the correct answer to this question?

The correct answer is: Replace push-based MFA with phishing-resistant MFA and reinforce verification for unusual login prompts. — The metrics show training improvements, but the incident summary reveals the remaining weakness: approval-based MFA abuse. Phishing-resistant MFA, such as FIDO2 or certificate-based authentication, removes the attacker’s ability to trick a user into approving a login prompt. Reinforcing verification for unusual requests adds user behavior support, but the technical control is what closes the biggest gap. This is a strong example of combining awareness with a more resilient authentication method. Why others are wrong: Generic posters may improve awareness but do not stop prompt fatigue or token abuse. Disabling MFA would sharply increase account takeover risk and remove a major defense. Allowing approvals from any device would make social engineering easier because the user would have fewer safeguards and less context. The best answer must reduce the attack path that already succeeded, not just improve messaging or convenience.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.