ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 230 - CS0-003 discussion

Report
Export

A manufacturer has hired a third-party consultant to assess the security of an OT network that includes both fragile and legacy equipment Which of the following must be considered to ensure the consultant does no harm to operations?

A.
Employing Nmap Scripting Engine scanning techniques
Answers
A.
Employing Nmap Scripting Engine scanning techniques
B.
Preserving the state of PLC ladder logic prior to scanning
Answers
B.
Preserving the state of PLC ladder logic prior to scanning
C.
Using passive instead of active vulnerability scans
Answers
C.
Using passive instead of active vulnerability scans
D.
Running scans during off-peak manufacturing hours
Answers
D.
Running scans during off-peak manufacturing hours
Suggested answer: C

Explanation:

In environments with fragile and legacy equipment, passive scanning is preferred to prevent any potential disruptions that active scanning might cause.

When assessing the security of an Operational Technology (OT) network, especially one with fragile and legacy equipment, it's crucial to use passive instead of active vulnerability scans. Active scanning can sometimes disrupt the operation of sensitive or older equipment. Passive scanning listens to network traffic without sending probing requests, thus minimizing the risk of disruption.

asked 02/10/2024
ENET SOLUTIONS LOGICOM
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first