ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 4 - 212-82 discussion

Report
Export

Hayes, a security professional, was tasked with the implementation of security controls for an industrial network at the Purdue level 3.5 (IDMZ). Hayes verified all the possible attack vectors on the IDMZ level and deployed a security control that fortifies the IDMZ against cyber-attacks.

Identify the security control implemented by Hayes in the above scenario.

A.
Point-to-po int communication
Answers
A.
Point-to-po int communication
B.
MAC authentication
Answers
B.
MAC authentication
C.
Anti-DoS solution
Answers
C.
Anti-DoS solution
D.
Use of authorized RTU and PLC commands
Answers
D.
Use of authorized RTU and PLC commands
Suggested answer: D

Explanation:

The use of authorized RTU and PLC commands is the security control implemented by Hayes in the above scenario. RTU (Remote Terminal Unit) and PLC (Programmable Logic Controller) are devices that control and monitor industrial processes, such as power generation, water treatment, oil and gas production, etc. RTU and PLC commands are instructions that are sent from a master station to a slave station to perform certain actions or request certain data. The use of authorized RTU and PLC commands is a security control that fortifies the IDMZ (Industrial Demilitarized Zone) against cyberattacks by ensuring that only valid and authenticated commands are executed by the RTU and PLC devices. Point-to-point communication is a communication method that establishes a direct connection between two endpoints. MAC authentication is an authentication method that verifies the MAC (Media Access Control) address of a device before granting access to a network. Anti-DoS solution is a security solution that protects a network from DoS (Denial-of-Service) attacks by filtering or blocking malicious traffic.

asked 18/09/2024
Michael Whitehouse
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first