exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 88 discussion

Actual exam question from CompTIA's CS0-002
Question #: 88
Topic #: 1
[All CS0-002 Questions]

Which of the following attack techniques has the GREATEST likelihood of quick success against Modbus assets?

  • A. Remote code execution
  • B. Buffer overflow
  • C. Unauthenticated commands
  • D. Certificate spoofing
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
david124
Highly Voted 2 years, 5 months ago
c it is, coming from someone who works in automotive cybersecurity
upvoted 5 times
...
nomad421
Most Recent 1 year, 11 months ago
This is a horrible question. Almost all could be the answer: Another vulnerability is due to lack of sufficient security checks in the MODBUS/TCP protocol implementation. The protocol specification does not include an authentication mechanism for validating communication between MODBUS master and slave devices. This flaw could allow an unauthenticated, remote attacker to issue arbitrary commands to any slave device via a MODBUS master. An attacker creates a specially crafted packet longer than 260 bytes and sends it to a MODBUS client and server. If the client or server were programmed incorrectly, this could lead to a successful buffer overflow or denial-of-service attack. The easiest attack to use against Modbus is to simply sniff the traffic on a network, find the Modbus devices and then issue harmful commands to the Modbus devices. https://www.radiflow.com/blog/hack-the-modbus/
upvoted 2 times
...
2Fish
2 years, 1 month ago
Selected Answer: C
C. Remote code execution, buffer overflow, and certificate spoofing attacks require more expertise and time to carry out successfully. However, unauthenticated commands pose the greatest likelihood of quick success against Modbus assets.
upvoted 2 times
...
Stiobhan
2 years, 2 months ago
I am going to sway for A here. To be honest all of them are plausible https://resources.infosecinstitute.com/topic/ics-scada-threats-and-threat-actors/
upvoted 2 times
Joshgip95
2 years, 2 months ago
100% C and you choose A? Stop throwing people off.
upvoted 4 times
Stiobhan
2 years, 1 month ago
At least I have some backup to what is only my opinion so don't nail me to the cross so easily my friend. On reflection, reading through TheSkyMan's resource it also stands a good chance of being C. Too many sheep on here mate that want to memorize answers and pass an exam, I am old school and need to know the why!! So if you are going to swear by an answer, have something to back it up with because other than that your statement is on subjective.
upvoted 4 times
...
...
...
HNICA
2 years, 4 months ago
Modbus messages can also be sent over Ethernet or TCP/IP. Remote code execution (RCE) attacks allow an attacker to remotely execute malicious code on a computer. The impact of an RCE vulnerability can range from malware execution to an attacker gaining full control over a compromised machine.
upvoted 2 times
...
haykaybam
2 years, 6 months ago
Selected Answer: C
I go with Option C has it tends more towards one of the vulenrabilities of Modbus systems - authentication. There is no authentication method for the Modbus TCP protocol to verify communication between MODBUS master and slave devices. A remote, unauthenticated attacker might take advantage of this exploit to send arbitrary commands through a MODBUS master to any slave device.
upvoted 2 times
...
Adrian831
2 years, 7 months ago
Selected Answer: C
C should be the correct one.
upvoted 2 times
...
TheSkyMan
2 years, 7 months ago
I'm leaning toward C. The Modbus protocol lacks security and heavily relies on command input (i.e. diagnostic commands). https://www.radiflow.com/blog/hack-the-modbus/
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago