exam questions

Exam Cybersecurity Fundamentals Specialist All Questions

View all questions & answers for the Cybersecurity Fundamentals Specialist exam

Exam Cybersecurity Fundamentals Specialist topic 1 question 14 discussion

Actual exam question from ISA's Cybersecurity Fundamentals Specialist
Question #: 14
Topic #: 1
[All Cybersecurity Fundamentals Specialist Questions]

Which of the following is a cause for the increase in attacks on IACS?

  • A. Use of proprietary communications protocols
  • B. The move away from commercial off the shelf (COTS) systems, protocols, and networks
  • C. Knowledge of exploits and tools readily available on the Internet
  • D. Fewer personnel with system knowledge having access to IACS
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Morax1100
2 weeks, 1 day ago
Selected Answer: C
One significant cause for the increase in attacks on Industrial Automation and Control Systems (IACS) is the widespread availability of exploits and hacking tools on the Internet. These tools allow attackers, even those with limited technical expertise, to target IACS more easily. This availability has made it simpler for malicious actors to discover and exploit vulnerabilities in industrial systems.
upvoted 1 times
...
kalpeshG
3 months, 3 weeks ago
Selected Answer: C
b states the move away from COTS and not the use of COTS. answer is c as exploits are readily available on internet and also vulenrabilities
upvoted 1 times
...
Jirol
4 months, 2 weeks ago
1.Control systems use more commercial off-the-shelf (COTS) software and hardware 2.Common use of Internet Protocols (IP) 3.Increased use of remote monitoring and access 4.Tools to automate attacks are commonly available answer is C.
upvoted 1 times
...
Jirol
4 months, 2 weeks ago
1.Control systems use more commercial off-the-shelf (COTS) software and hardware 2.Common use of Internet Protocols (IP) 3.Increased use of remote monitoring and access 4.Tools to automate attacks are commonly available Knowledge exploit tools (answer C) is slightly different from the tools to automate attacks are commonly avail (pt4). So, the correct answer is B. (pt1)
upvoted 1 times
...
Agi
4 months, 3 weeks ago
answer = c
upvoted 1 times
...
969b6a5
4 months, 3 weeks ago
answer=C
upvoted 1 times
...
dashuai
5 months ago
Selected Answer: C
The answert is C
upvoted 1 times
...
Malnad
6 months, 3 weeks ago
C. Knowledge of exploits and tools readily available on the Internet This is a significant cause for the increase in attacks on Industrial Automation and Control Systems (IACS), as the availability of information and tools online makes it easier for attackers to exploit vulnerabilities in these systems.
upvoted 1 times
...
rizrash
9 months, 1 week ago
B as per Page 34 of ISA Booklet
upvoted 1 times
...
0u0JT
9 months, 3 weeks ago
No, correct answer is B under the logic that COTS - and you don't have to forget about this- are designed for availability in physical data collection.
upvoted 1 times
...
Agi
10 months ago
Correct answer is C - Knowledge of exploits and tools readily available on the Internet
upvoted 1 times
...
loser4fun
10 months, 3 weeks ago
Answer is C The increase in attacks on Industrial Automation and Control Systems (IACS) is often attributed to the accessibility of knowledge, exploits, and tools on the Internet. As information becomes more readily available, malicious actors can leverage this knowledge to target vulnerabilities in IACS components. The widespread sharing of hacking techniques and tools online makes it easier for attackers to exploit weaknesses in these systems. While other factors mentioned, such as the use of proprietary protocols and reduced personnel knowledge, can contribute to security challenges, the ready availability of exploits on the Internet is a significant factor in the increase of attacks on IACS.
upvoted 1 times
...
fermins
1 year, 1 month ago
Selected Answer: C
B doesnt make sense, its the use of COTS,and not running away from them, what creates the risk. Malware as a service is a risk
upvoted 2 times
...
ChrisW9200
1 year, 1 month ago
Selected Answer: C
There us no move away from COTS. Availability of Exploits of legacy OS and Tools makes attacks easier.
upvoted 3 times
...
ChrisW9200
1 year, 1 month ago
Absolutely C
upvoted 1 times
...
Evan7557
1 year, 2 months ago
Answer C
upvoted 1 times
...
rupert12
1 year, 2 months ago
Selected Answer: C
Vote C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago