ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 11 - PT0-003 discussion

Report
Export

A penetration tester is testing a power plant's network and needs to avoid disruption to the grid. Which of the following methods is most appropriate to identify vulnerabilities in the network?

A.
Configure a network scanner engine and execute the scan.
Answers
A.
Configure a network scanner engine and execute the scan.
B.
Execute a testing framework to validate vulnerabilities on the devices.
Answers
B.
Execute a testing framework to validate vulnerabilities on the devices.
C.
Configure a port mirror and review the network traffic.
Answers
C.
Configure a port mirror and review the network traffic.
D.
Run a network mapper tool to get an understanding of the devices.
Answers
D.
Run a network mapper tool to get an understanding of the devices.
Suggested answer: C

Explanation:

When testing a power plant's network and needing to avoid disruption to the grid, configuring a port mirror and reviewing the network traffic is the most appropriate method to identify vulnerabilities without causing disruptions.

Port Mirroring:

Definition: Port mirroring (SPAN - Switched Port Analyzer) is a method of monitoring network traffic by duplicating packets from one or more switch ports to another port where a monitoring device is connected.

Purpose: Allows passive monitoring of network traffic without impacting network operations or device performance.

Avoiding Disruption:

Non-Intrusive: Port mirroring is non-intrusive and does not generate additional traffic or load on the network devices, making it suitable for sensitive environments like power plants where disruption is not acceptable.

Other Options:

Network Scanner Engine: Active scanning might disrupt network operations or devices, which is not suitable for critical infrastructure.

Testing Framework: Validating vulnerabilities on devices might involve active testing, which can be disruptive.

Network Mapper Tool: Running a network mapper tool (like Nmap) actively scans the network and might disrupt services.

Pentest

Reference:

Passive Monitoring: Passive techniques such as port mirroring are essential in environments where maintaining operational integrity is critical.

Critical Infrastructure Security: Understanding the need for non-disruptive methods in critical infrastructure penetration testing to ensure continuous operations.

By configuring a port mirror and reviewing network traffic, the penetration tester can identify vulnerabilities in the power plant's network without risking disruption to the grid.

asked 02/10/2024
TAMPO DARKOI
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first