exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 337 discussion

Actual exam question from CompTIA's CS0-002
Question #: 337
Topic #: 1
[All CS0-002 Questions]

Which of the following weaknesses associated with common SCADA systems are the MOST critical for organizations to address architecturally within their networks? (Choose two.)

  • A. Boot processes that are neither measured nor attested
  • B. Legacy and unpatchable systems software
  • C. Unnecessary open ports and protocols
  • D. No OS kernel mandatory access controls
  • E. Unauthenticated commands
  • F. Insecure filesystem permissions
Show Suggested Answer Hide Answer
Suggested Answer: BC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Kashim
Highly Voted 2 years, 1 month ago
Selected Answer: BE
I would say: B. Legacy and unpatchable systems software E. Unauthenticated commands
upvoted 5 times
Adji91
2 years, 1 month ago
Please, could you explain why you choose B & E?
upvoted 1 times
...
khrid4
2 years, 1 month ago
Option B, Legacy and unpatchable systems software, is a critical weakness because many SCADA systems rely on older technologies and software that are no longer supported by the vendors or are difficult to update or patch. As a result, these systems can be vulnerable to known and unknown exploits that can be easily exploited by attackers. Option E, Unauthenticated commands, is also a critical weakness because SCADA systems often use proprietary protocols and commands that are not authenticated or encrypted, making it easy for attackers to inject unauthorized commands and manipulate the system. Why Not D? D could also be a critical weakness for SCADA systems. However, it is not as commonly exploited as the other vulnerabilities listed in the answer choices. The lack of OS kernel mandatory access controls means that the SCADA system may not have sufficient security controls in place to prevent unauthorized access or changes to the system. This could potentially lead to system compromise or damage. However, the other vulnerabilities listed in the answer choices are more commonly exploited by attackers to compromise SCADA systems.
upvoted 1 times
...
...
ID77
Most Recent 7 months ago
Selected Answer: BC
According to Jason Dion Course(Section 29, 242) is B and C.
upvoted 1 times
...
zecomeia_007
8 months, 1 week ago
Selected Answer: BC
critical for organizations to address ARCHITECTURALLY.
upvoted 2 times
...
novolyus
1 year, 4 months ago
Selected Answer: BE
Actually C does not makes sense to me. Why should it have unnecessary open ports and services?
upvoted 1 times
...
Dree_Dogg
1 year, 7 months ago
Selected Answer: BC
...critical for organizations to address ARCHITECTURALLY.
upvoted 3 times
...
Big_Dre
1 year, 7 months ago
Selected Answer: BE
we all agree with B in the previous dump E was the correct answer i dont see why it will change now
upvoted 2 times
...
POWNED
1 year, 8 months ago
Selected Answer: BE
After taking multiple Comptia certs that involve SCADA systems the main issues with SCADA is legacy software, and unauthenticated commands.
upvoted 1 times
...
karpal
1 year, 10 months ago
Selected Answer: CE
Usually SCADA is air gapped. it is quite hard to upgrade do the operation requirement of OT Networks. the most critical would be the open ports and unauthenticated commands.
upvoted 2 times
...
karpal
1 year, 10 months ago
Usually SCADA is air gapped. it is quite hard to upgrade do the operation requirement of OT Networks. the most critical would be the open ports and unauthenticated commands.
upvoted 1 times
...
adrian1188
1 year, 11 months ago
Selected Answer: BC
Legacy software One of the biggest problems for ICS/SCADA systems is that they often run on legacy software that lacks sufficient security. Most of this type of software doesn’t implement security fundamentals such as user/system authentication and data integrity checking features, allowing attackers to carry out a broad range of attacks against the ICS components. Networking issues It is very common to find internet-facing ICS/SCADA systems that are not properly protected and hosted on a misconfigured network. In many cases, firewalls employed as a defense measure for the industrial networks fail to detect/block malicious activity launched by external attackers, allowing them to access the OT systems. In some cases, SCADA systems are connected to unaudited dial-up lines, or operators of the industrial environment have wrongly configured remote-access servers that could give attackers a path to access to the OT network as well as the corporate LAN.
upvoted 3 times
...
justauser
2 years ago
Selected Answer: BC
GPT-4: In the context of a cybersecurity exam, the most critical weaknesses associated with common SCADA systems that organizations should address architecturally within their networks are: B. Legacy and unpatchable systems software - Legacy and unpatchable systems software is a high-risk vulnerability as it is often outdated and unsupported, making it an easy target for attackers. Organizations should prioritize replacing legacy systems with updated versions or implementing compensatory controls to minimize the risks. C. Unnecessary open ports and protocols - Unnecessary open ports and protocols can provide attackers with entry points to exploit vulnerabilities in the system. Organizations should regularly scan their networks to identify and close any unnecessary open ports and protocols to reduce the attack surface. While the other options listed in the question are also weaknesses associated with SCADA systems, addressing legacy systems and unnecessary open ports and protocols are considered the most critical and should be given the highest priority.
upvoted 3 times
...
Alizade
2 years ago
Selected Answer: BE
The most critical weaknesses associated with common SCADA systems for organizations to address architecturally within their networks are: B. Legacy and unpatchable systems software E. Unauthenticated commands
upvoted 1 times
...
Cookieman
2 years ago
Selected Answer: BC
BC, it specifically mentions NETWORK ARCHITECTURE
upvoted 1 times
...
2Fish
2 years, 1 month ago
Selected Answer: BC
BC for me. While most of these do pose an issue for SCADA systems, BC look to me the most critical.
upvoted 2 times
Adji91
2 years, 1 month ago
Thank You!
upvoted 1 times
...
2Fish
2 years ago
After reviewing again.. I am changing to BE. B is a given, and E is on the list of critical issues.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago