easymultiple choiceObjective-mapped

Exhibit

Build pipeline notes:
- Package manager updated dependency: "fast-logger" from 2.4.1 to 2.4.2
- New outbound connection at startup: api.fast-logger-support[.]com
- No code changes were made by the development team
- Security review note: "Dependency source is a recently created public repository account"

Based on the exhibit, which supply-chain threat is most likely?

Question 1easymultiple choice
Full question →

Based on the exhibit, which supply-chain threat is most likely?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Dependency compromise

The application began contacting an unfamiliar domain immediately after a dependency update, and the package came from a newly created repository account. That strongly suggests dependency compromise, a supply-chain issue where a trusted library has been replaced or altered with malicious behavior.

B

Distractor review

Brute-force attack

Brute force targets authentication by trying many passwords or tokens. The exhibit shows suspicious behavior after a package update, not repeated login attempts.

C

Distractor review

SQL injection

SQL injection manipulates database queries through user input. The evidence here points to a third-party dependency and outbound network activity during startup.

D

Distractor review

Privilege escalation

Privilege escalation involves gaining higher access on a host or application. The exhibit instead shows a potentially malicious dependency introducing unexpected external communications.

Common exam trap

Common exam trap: authentication is not authorization

Logging in proves the user can authenticate. It does not automatically mean the user is allowed to enter privileged or configuration mode. Watch for AAA authorization, privilege level and command authorization details.

Technical deep dive

How to think about this question

This kind of question is testing the difference between identity and permission. A user may successfully log in to a router because authentication is working, but still fail to enter configuration mode because authorization is missing, misconfigured or mapped to a lower privilege level.

KKey Concepts to Remember

  • Authentication checks who the user is.
  • Authorization controls what the user is allowed to do after login.
  • Privilege levels affect access to EXEC and configuration commands.
  • AAA, TACACS+ and RADIUS can separate login success from command access.

TExam Day Tips

  • Do not assume successful login means full administrative access.
  • Look for words such as cannot enter configuration mode, privilege level, authorization or command access.
  • Separate login problems from permission problems before choosing the answer.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Authentication checks who the user is.

What is the correct answer to this question?

The correct answer is: Dependency compromise — Dependency compromise is the best fit because the problem began immediately after a third-party library update, and the library is now reaching out to an unexpected domain. That is a classic supply-chain warning sign. When the development team did not change application code but behavior changed after the package update, the library itself becomes the likely source of risk. Why others are wrong: Brute force would show repeated authentication failures, not a new network call from an updated package. SQL injection depends on malicious database input, which is not present here. Privilege escalation is about increasing permissions on a system, while the issue in the exhibit is an untrusted dependency behaving unexpectedly after installation.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.