exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 397 discussion

Actual exam question from CompTIA's CS0-002
Question #: 397
Topic #: 1
[All CS0-002 Questions]

Which of the following is the greatest security concern regarding ICS?

  • A. The involved systems are generally hard to identify.
  • B. The systems are configured for automatic updates, leading to device failure.
  • C. The systems are oftentimes air gapped, leading to fileless malware attacks.
  • D. Issues on the systems cannot be reversed without rebuilding the systems.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
skibby16
1 year, 7 months ago
Selected Answer: D
Industrial control systems (ICS) are systems that monitor and control physical processes, such as power generation, water treatment, manufacturing, and transportation. ICS are often critical for public safety and national security, and therefore a prime target for cyberattacks. One of the greatest security concerns regarding ICS is that issues on the systems cannot be reversed without rebuilding the systems. This means that any damage or disruption caused by an attack can have long-lasting and catastrophic consequences for the physical infrastructure and human lives. The other options are not true or not specific to ICS. References: CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives (CS0-002), page 13
upvoted 2 times
...
novolyus
1 year, 7 months ago
Selected Answer: C
es la C de forma evidente
upvoted 1 times
...
grelaman
1 year, 7 months ago
Selected Answer: D
This is because ICS systems are often critical infrastructure systems, and downtime for these systems can be very costly and disruptive. Additionally, ICS systems may contain proprietary software or hardware that is not easily replaced, making it difficult to restore systems to a previous state after a cyberattack.
upvoted 2 times
...
Apollo28
1 year, 7 months ago
Selected Answer: C
Going with C. https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2023/common-cybersecurity-risks-to-ics-ot-systems#:~:text=Some%20of%20the%20most%20common,intellectual%20property%20and%20financial%20information.
upvoted 2 times
...
Sirrcle
1 year, 8 months ago
Selected Answer: D
Answer is D
upvoted 2 times
...
kmordalv
1 year, 8 months ago
Selected Answer: C
https://www.techtarget.com/searchsecurity/tip/Top-10-ICS-cybersecurity-threats-and-challenges#:~:text=Malware,malware%20and%20other%20cyber%20attacks.
upvoted 1 times
...
kumax
1 year, 8 months ago
Selected Answer: D
ChatGPT The greatest security concern regarding Industrial Control Systems (ICS) is: D. Issues on the systems cannot be reversed without rebuilding the systems. In ICS environments, especially in critical infrastructure sectors such as energy, water, and manufacturing, the operational technology (OT) systems often control essential processes and may be responsible for human safety. These systems are designed for reliability and availability and are typically challenging to modify or reverse without significant disruption to operations. As a result, security incidents, such as malware infections or breaches, can have severe consequences and may require rebuilding or reconfiguring systems, causing significant downtime and potentially substantial costs. Therefore, protecting ICS from cyber threats and vulnerabilities is of paramount importance.
upvoted 2 times
kmordalv
1 year, 8 months ago
Please, let's try to reason the answer and do some research. It is very easy to turn to ChatGPT believing that it will give the right answer but sometimes it is wrong. https://www.techtarget.com/searchsecurity/tip/Top-10-ICS-cybersecurity-threats-and-challenges#:~:text=Malware,malware%20and%20other%20cyber%20attacks.
upvoted 6 times
...
[Removed]
1 year, 7 months ago
If you want to use ChatGPT, you have to add "According to CompTIA CYSA-002" at the end of every question.
upvoted 1 times
...
...
Rori791
1 year, 11 months ago
Selected Answer: C
C is the best option. A. The involved systems are generally hard to identify. It is true that ICS systems can be difficult to identify and locate, but this is not the greatest security concern for ICS. There are various techniques and tools available to help identify and map out ICS systems, such as network scanning and vulnerability assessments. Once the systems are identified, appropriate security measures can be implemented to protect them. B. The systems are configured for automatic updates, leading to device failure. Automatic updates can sometimes cause issues with ICS systems, but it is not the greatest security concern for ICS. Most ICS systems are configured to only accept updates that have been tested and approved by the vendor.
upvoted 1 times
Rori791
1 year, 11 months ago
D. Issues on the systems cannot be reversed without rebuilding the systems. The inability to reverse issues on ICS systems without rebuilding them can be a challenge, but it is also not the greatest security concern for ICS. There are various techniques and tools available to help diagnose and troubleshoot issues on ICS systems, such as log analysis, network monitoring, and system backups. While rebuilding the systems may be necessary in some cases, it is not always the only option. C. The systems are oftentimes air-gapped, leading to fileless malware attacks. Air-gapping of ICS systems is a significant security concern because it can make it more difficult to detect and respond to fileless malware attacks, which are becoming increasingly common and sophisticated. It can also make it more challenging to implement security updates and patches, as these may need to be manually installed on each device.
upvoted 2 times
...
...
Kartibok
1 year, 11 months ago
In my mind I have: A: True, if they are not directly on a network. B. Chances are they would not be set to auto update as they may not have the hardware capacity to do so. C. If they are air-gapped - then only access to the machine would allow a memory only attack. D. This to me is feasible as they may be difficult to manage if there are issues and require rebuilds. Any comments?
upvoted 1 times
...
Dutch012
2 years ago
Nice!, any ideas ?
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...