Exam SY0-601 All QuestionsBrowse all questions from this exam
Question 852

During a penetration test, a flaw in the internal PKI was exploited to gain domain administrator rights using specially crafted certificates. Which of the following remediation tasks should be completed as part of the cleanup phase?

    Correct Answer: B

    During a penetration test, if a flaw in the internal PKI was exploited to gain domain administrator rights using specially crafted certificates, it indicates a critical vulnerability within the Certificate Authority (CA). Patching the CA addresses the root cause of the vulnerability by applying necessary software updates, security patches, or configuration changes. This remediation task is essential to prevent similar exploits in the future, ensuring the integrity and security of the PKI infrastructure.

Discussion
mikzerOption: A

Performed a search for CA patching, never came up. Going with A. Have to revoke the certificate and redo the process correctly. When a CA revokes a certificate, it updates the CRL. Then, the CRL is digitally signed by the issuer and distributed to all entities that rely on it. This process must run correctly, as errors can lead to significant security vulnerabilities. Related to Q#709.

shady23Option: B

Patching the Certificate Authority (CA) is the most critical remediation task in this scenario because the flaw in the internal PKI system was exploited to gain unauthorized access. By patching the CA, the organization can address the vulnerability that allowed the exploitation to occur in the first place. This action helps prevent similar attacks in the future by fixing the underlying security issue within the PKI infrastructure.

Gigi42Option: B

Invalid certificates are revoked. CA is a separate entity from the companies who request the services of obtaining certificates. So why is the company patching the CA?

GeronemoOption: B

If the flaw in the internal PKI allowed an attacker to gain domain administrator rights using specially crafted certificates, it indicates a serious security vulnerability within the CA infrastructure. Patching the CA involves fixing the vulnerability by applying software updates, security patches, or configuration changes to eliminate the exploited flaw. This helps prevent similar attacks in the future and ensures the integrity and security of the PKI. Similarly, updating the Certificate Revocation List (CRL) (option A) is important for revoking compromised certificates, but it does not address the underlying flaw in the PKI.

RavnitOption: B

B is correct In this scenario, exploiting a flaw in the internal PKI system led to unauthorized access and the elevation of privileges. To prevent similar incidents in the future, it is crucial to address the root cause of the vulnerability, which in this case is the flaw in the Certificate Authority (CA)

paCer66Option: B

B. Pentest-cleanup-remediation (CA patching)-final control retest.

fb8c9bbOption: A

In the scenario described, a flaw in the internal PKI was exploited. The most relevant remediation task to address this specific issue would be to update the Certificate Revocation List (CRL). This would help in invalidating any compromised certificates and ensuring that they cannot be used again.

CircaGOption: B

B. In this scenario, the exploitation involved a flaw in the internal Public Key Infrastructure (PKI). Patching the Certificate Authority (CA) is crucial to address this vulnerability and prevent similar exploits in the future. By patching the CA software, any known security vulnerabilities or weaknesses can be addressed, enhancing the overall security of the PKI infrastructure.

NetworkTester1235

Why isn't it A? A seems to be a good part of cleanup, revoking the specially crafted certificates