exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 98 discussion

Actual exam question from CompTIA's CS0-002
Question #: 98
Topic #: 1
[All CS0-002 Questions]

An analyst receives an alert from the continuous-monitoring solution about unauthorized changes to the firmware versions on several field devices. The asset owners confirm that no firmware version updates were performed by authorized technicians, and customers have not reported any performance issues or outages.
Which of the following actions would be BEST for the analyst to recommend to the asset owners to secure the devices from further exploitation?

  • A. Change the passwords on the devices.
  • B. Implement BIOS passwords.
  • C. Remove the assets from the production network for analysis.
  • D. Report the findings to the threat intel community.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Laudy
Highly Voted 2 years, 10 months ago
I think this is C. If were referring to other devices, yes - Implement BIOS passwords before they are compromised. But the ones that were already compromised, they need to be removed from the system to avoid further exploitation. Plus, if you put a password on there, the attacker may now have your password.
upvoted 20 times
Abz1999
1 year, 9 months ago
this makes the most sense, idk why people are confused
upvoted 1 times
...
...
RobV
Most Recent 1 year, 6 months ago
Selected Answer: C
C. Remove the assets from the production network for analysis.
upvoted 2 times
...
sirpetey
1 year, 7 months ago
SO. From my understanding.... just googling... Field devices are "Equipment that is connected to the field side on an ICS. Types of field devices include RTUs, PLCs, actuators, sensors, HMIs, and associated communications." which doesn't have BIOS? so it would have to be C?
upvoted 1 times
...
Big_Dre
1 year, 10 months ago
Selected Answer: B
i will go with B because the key statement is ; To secure the devices from further exploitation; device not system. so i think B fits perfectly.
upvoted 1 times
...
naleenh
1 year, 10 months ago
Selected Answer: C
Among the options provided, the best action to recommend is to remove the assets from the production network for analysis
upvoted 4 times
...
heinzelrumpel
1 year, 11 months ago
Selected Answer: C
The other answers don't fit
upvoted 3 times
...
heinzelrumpel
1 year, 11 months ago
The question is mentioning "devices". That could be tablets and phones which don't have BIOS
upvoted 3 times
...
Noragretz
1 year, 11 months ago
I was looking for “contain” as the key word and not “remove from production” good to see it in different wording.
upvoted 1 times
...
JimmyJams
1 year, 11 months ago
Selected Answer: C
In the real world you would remove those devices in the first instance and this fits the question as removing them would be securing them and removing them from further exploitation. Then you would examine them in your lab setup.
upvoted 3 times
...
tutita
2 years ago
Selected Answer: B
the best step for securing the devices is to implement password BIOS...
upvoted 3 times
...
kiduuu
2 years, 2 months ago
Unauthorized changes to firmware versions on field devices indicate that the devices have likely been compromised by an attacker.By removing the compromised devices from the production network for analysis, the organization can better understand the extent of the compromise and take steps to remediate the issue. Changing the passwords on the devices (A) or implementing BIOS passwords (B) may provide some additional security, but these measures are unlikely to fully address the compromise of the devices.
upvoted 1 times
...
2Fish
2 years, 3 months ago
Selected Answer: C
C. it is essential to isolate the devices and analyze them in a controlled environment to identify the root cause of the issue, assess the scope of the compromise, and implement appropriate remediation measures.
upvoted 2 times
Jacobmy98
2 years, 3 months ago
I’ve been following most of your answers lol. It has to be B: it’s asking for the BEST way to secure the devices. Not the next step
upvoted 1 times
...
...
IanRogerStewart
2 years, 4 months ago
Selected Answer: C
Next step is Containment. Remove devices
upvoted 1 times
Jacobmy98
2 years, 3 months ago
It’s not asking for the next step. It’s asking what is the BEST way to secure the devices
upvoted 3 times
JoInn
2 years, 1 month ago
yes, to avoid FURTHER exploitation. Same thing is what comes next lol
upvoted 1 times
...
...
...
Cock
2 years, 4 months ago
In this scenario, the unauthorized changes to the firmware versions of the field devices indicate a potential security breach. To secure the devices from further exploitation, the best course of action is to remove them from the production network for analysis. This will help to prevent any potential harm to the network and reduce the risk of further compromise. The analysis will also provide important information for determining the source and extent of the breach, as well as any necessary steps to remediate it. Other recommended actions may include changing passwords, implementing BIOS passwords, and reporting the findings to the threat intel community, but removing the assets from the production network should be the first priority
upvoted 1 times
...
Stiobhan
2 years, 4 months ago
Removing the devices from the production network?? What will you replace them with?? For sure some analysis will need to be completed but the key in the question is "Secure devices from FURTHER EXPLOITATION. Changing the BIOS passwords would be the best fit.
upvoted 3 times
...
knister
2 years, 5 months ago
Selected Answer: B
B, the only one that secures the devices.
upvoted 3 times
...
lordguck
2 years, 7 months ago
I go for C: in order to investigate. B: can't be right, as the question talks about "field devices" which may or may not have an accessible bios.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...