exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 130 discussion

Actual exam question from CompTIA's CAS-004
Question #: 130
Topic #: 1
[All CAS-004 Questions]

A security architect for a large, multinational manufacturer needs to design and implement a security solution to monitor traffic.
When designing the solution, which of the following threats should the security architect focus on to prevent attacks against the ׀׀¢ network?

  • A. Packets that are the wrong size or length
  • B. Use of any non-DNP3 communication on a DNP3 port
  • C. Multiple solicited responses over time
  • D. Application of an unsupported encryption algorithm
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
enduser9000
11 months, 2 weeks ago
Selected Answer: B
Manufacturing involves ICS, which widely uses DNP3
upvoted 1 times
...
23169fd
11 months, 3 weeks ago
Selected Answer: B
DNP3 is a common communication protocol used in industrial control systems. Ensuring that only DNP3 traffic is present on ports designated for DNP3 is crucial for maintaining the integrity and security of the network.
upvoted 1 times
...
SangSang
1 year ago
Selected Answer: B
DNP3 is widely used in SCADA systems and ICS for communication between control systems and devices. One of the significant threats in this context is the potential for malicious actors to send non-DNP3 traffic over ports designated for DNP3 communication. This could indicate an attempt to exploit vulnerabilities, inject malicious payloads, or conduct unauthorized activities.
upvoted 1 times
...
cf702b6
1 year, 4 months ago
If you read the question, the security architect is designing the solution to monitor traffic. The security architect is trying to prevent attacks against the ICS network itself. Ideally, remote connections into ICS should pass through the demilitarized zone (DMZ) between the IT and OT segments. Firewalls, authentication services, jump servers, and file servers all play crucial roles in conducting these connections securely. So C would be the correct answer?
upvoted 1 times
...
BiteSize
1 year, 11 months ago
Selected Answer: B
Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 2 times
...
FOURDUE
2 years, 5 months ago
Selected Answer: B
B. here is why direct from the Official Comptia Handbook: Modbus The components of an ICS network are often described as an operational technology (OT) network, in contrast to an IT network, comprised of server and client computing devices. Communications within an OT network are supported by a network application protocol such as Modbus. The communication protocol gives control servers and SCADA hosts the ability to query and change the configuration of each PLC. Modbus was originally designed as a serial protocol (Modbus RTU) running over a fieldbus network but has been adapted to use Ethernet and TCP/IP as well. Other protocols include EtherNet/IP, a variant of the Common Industrial Protocol (CIP), Distributed Network Protocol (DNP3), and Siemens S7comms.
upvoted 2 times
FOURDUE
2 years, 5 months ago
we are looking for the BEST answer and this B is the only one specific to OT. This is NOT an IT network in the question. This is an ICS or Industrial Control System
upvoted 2 times
...
...
Mr_BuCk3th34D
2 years, 6 months ago
Selected Answer: A
Packets that are the wrong size or length can be an indication of a variety of different types of attacks, including denial of service (DoS) attacks, which aim to disrupt the availability of a network or service by flooding it with traffic. By monitoring for packets that are the wrong size or length, the security architect can identify and prevent these types of attacks from being successful. Use of any non-DNP3 communication on a DNP3 port, multiple solicited responses over time, and the application of an unsupported encryption algorithm may all be indicators of potential security issues, but they are not necessarily threats to the network itself.
upvoted 1 times
Mr_BuCk3th34D
2 years, 6 months ago
What makes me think that it might be alternative B, is that the question states this is a "manufacturer" company. DNP3 is a communication protocol that is commonly used in the industrial control systems. The use of any non-DNP3 communication on a DNP3 port could potentially be an indication of a security issue, as it may suggest that an unauthorized device or system is attempting to communicate with the network.
upvoted 2 times
FOURDUE
2 years, 5 months ago
because it is an OT network.
upvoted 2 times
...
...
...
kycugu
2 years, 6 months ago
The security architect should focus on preventing any non-DNP3 communication on a DNP3 port as this could be an indication of a malicious attack. By monitoring traffic and blocking any non-DNP3 communication, the security architect can reduce the risk of an attack. Answer is B
upvoted 3 times
...
[Removed]
2 years, 8 months ago
Selected Answer: B
answer B Makes more sense to me. Manufacturing company meaning it will be using DNP3. Manufacturing company meaning it will be using DNP3. The DNP3 standard was designed for remote communication in utilities The DNP3 standard was designed for remote communication in utilities
upvoted 2 times
...
AlexJacobson
2 years, 11 months ago
Selected Answer: B
https://en.wikipedia.org/wiki/DNP3
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...