exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 406 discussion

Actual exam question from CompTIA's SY0-501
Question #: 406
Topic #: 1
[All SY0-501 Questions]

An organization has several production-critical SCADA supervisory systems that cannot follow the normal 30- day patching policy.
Which of the following BEST maximizes the protection of these systems from malicious software?

  • A. Configure a firewall with deep packet inspection that restricts traffic to the systems.
  • B. Configure a separate zone for the systems and restrict access to known ports.
  • C. Configure the systems to ensure only necessary applications are able to run.
  • D. Configure the host firewall to ensure only the necessary applications have listening ports
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Basem
Highly Voted 5 years, 9 months ago
I think it should be B since you isolate the network. usually for ScADA you want to isolate the network.
upvoted 11 times
FNavarro
4 years, 3 months ago
SCADA already implies that it's air gapped
upvoted 2 times
Heymannicerouter
4 years, 2 months ago
Is it air gapped if it connects to a firewall?
upvoted 1 times
...
...
...
SimonR2
Highly Voted 5 years ago
I’ve had a good look into this one and I believe the given answer A is correct. Some quotes off google: Quote 1 “Two things must be done to avoid attacks which exploit weaknesses in SCADA protocols. First, verify that a command is coming from a valid master/source. Second, ensure all requests are correct and do not endanger the plant’s safety.” Quote 2 “These critical systems are largely based on legacy SCADA... Many of these products are decades old and were never designed with security in mind. The good news is that there is an effective and easy-to-deploy solution to this security crisis. Using an advanced technology called “Deep Packet Inspection” (DPI), SCADA-aware firewalls offer fine-grained control of control system traffic.” There is even a book written about answer A: https://www.belden.com/resources/knowledge/other/dpi-tk-lp
upvoted 11 times
...
AlexChen011
Most Recent 4 years, 3 months ago
The question stated "protection of SCADA systems from malicious software", it is not protecting from "external threats", it is against [software], hence C makes sense.
upvoted 1 times
...
Manojk
4 years, 4 months ago
It should c
upvoted 1 times
...
Varus
4 years, 7 months ago
"You make sure there are firewalls protecting the access, and that the proper access controls are in place so that you can be assured that only the people who need access to these SCADA systems will be the only ones to ever touch it." https://www.professormesser.com/security-plus/sy0-401/embedded-system-security/ Comes from Prof messer on Embedded System security. I think it is A because of this and it doesn't note any other applications be able to run cause i don't think SCADA can even run any applications besides its embedded OS. Still though many are saying C.
upvoted 1 times
...
CSSJ
4 years, 8 months ago
C. whitelisting of apps
upvoted 2 times
...
Teza
4 years, 9 months ago
I think C is correct. If you restrict the application that can run on the system (whitelist), the malware will not be able to run even if it can be delivered into the system
upvoted 2 times
...
WDE2015
4 years, 10 months ago
SCADA is a physically separated network and accessible with a jump box,VPN or RTU. A firewall can restrict all other traffic to know ports because a jump box uses and HMI or corporate can connect through VPN or at regional remote locations through RTU remote terminal unit as the corporate network is separated from the SCADA. Again with SCADA think regional size a refinery linked to a chemical plant connected to an oil rig in the gulf. At each location there is a type of SCADA an ICS industrial control system this is what process operators use to monitor sensors for example in a refinery that will shut down dangerous processes if they occur. There linked through the SCADA network. Applications would only be used to access data servers compiling production statistics and historical data accessed by the internal corporate network through VPN. That’s why A is correct and a firewall can logically separate systems within the SCADA, deny or allow ports and applications accessible only within the SCADA.
upvoted 1 times
...
Hemonie
4 years, 10 months ago
Same question from exam topic with different answer https://www.examtopics.com/discussions/comptia/view/11674-exam-cas-002-topic-6-question-73-discussion/
upvoted 4 times
...
Don_H
4 years, 10 months ago
lIMITING THE APPLICATIONS TO JUST THE NECESSARY APPLICATIONS FURTHER STRENGTHENS SECURITY. IF PATCHES CAN NOT BE MANAGE PER POLICY OF 30 DAYS, THEN THE NEXT APPROACH IS TO LIMIT THE RISK BY LIMITING THE APPLICATIONS THAT RUN ON THE SYSTEM
upvoted 2 times
...
MelvinJohn
5 years ago
A If the critical SCADA systems do not always have the latest patches then they are vulnerable to attack in any zone on any port unless either air-gapped else a firewall is there and configured to protect them. A host firewall wouldn’t be as effective as a firewall on the network where the SCADA systems reside. In any of the above answers they would remain vulnerable, but perhaps least vulnerable with a network firewall protecting them.
upvoted 2 times
...
humle
5 years, 3 months ago
several production-critical SCADA It needs to communicate, best answer to this is packet inspection
upvoted 1 times
...
fernriva
5 years, 4 months ago
https://www.energy.gov/sites/prod/files/oeprod/DocumentsandMedia/21_Steps_-_SCADA.pdf Up near the top of the list to better protect SCADA is the line that states to limit the applications. There is no mention of firewall. So the best answer is C.
upvoted 3 times
...
Learner777
5 years, 4 months ago
C: for me - all others permit some form of access to SCADA
upvoted 4 times
...
riley5
5 years, 5 months ago
I have seen C chosen as well as D and I am struggling also to clarify this. I have sifted through Gibson's book to see if anything specifically refers to this. This is what I found. He says, "while SCADA systems operate within their own network, it’s common to ensure that they are isolated from any other network. This physical isolation significantly reduces risks to the SCADA system. If an attacker can’t reach it from the Internet, it is much more difficult to attack it. However, if the system is connected to the internal network, it’s possible for an attacker to gain access to internal computers, and then access any resource on the internal network. " So I'm sort of wondering now if the default answer is correct since it mentions this directly, but I can see how the others make sense as well. The one thing that makes me doubt this is that most SCADA systems are already assumed to be independent at the get go.
upvoted 2 times
GMO
5 years, 5 months ago
My Ans is C. If we follow the question, you can see they are not saying there may be a network misconfig. the question is patch related which typically would affect applications running on the scada system. if it cannot be on the typical patch cycle, simply limit the applications running to only necessary application to reduce impact from not patching regularly
upvoted 6 times
...
...
Zen1
5 years, 5 months ago
Many sources are suggesting the answer is C, I'm really not sure myself.
upvoted 3 times
...
KhalilAreig
5 years, 7 months ago
should be C
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...