exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 68 discussion

Actual exam question from CompTIA's PT0-002
Question #: 68
Topic #: 1
[All PT0-002 Questions]

A company hired a penetration-testing team to review the cyber-physical systems in a manufacturing plant. The team immediately discovered the supervisory systems and PLCs are both connected to the company intranet.
Which of the following assumptions, if made by the penetration-testing team, is MOST likely to be valid?

  • A. PLCs will not act upon commands injected over the network.
  • B. Supervisors and controllers are on a separate virtual network by default.
  • C. Controllers will not validate the origin of commands.
  • D. Supervisory systems will detect a malicious injection of code/commands.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RRabbit_111
Highly Voted 1 year, 5 months ago
C. Controllers will not validate the origin of commands The assumption that controllers will not validate the origin of commands is most likely to be valid. Many legacy industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems are not designed with security in mind and lack basic security features such as authentication and access controls. As a result, it is common for these systems to accept commands from any source without verifying their origin. This makes them vulnerable to attacks such as command injection, which can be used to disrupt or damage the systems they control. Option A & D are likely to be invalid assumptions, many PLCs can act upon commands injected over the network and supervisory systems can detect malicious injection of code/commands if properly configured. Option B is also likely to be invalid as it is not a common practice, usually, the supervisory systems and PLCs are connected to the same network, and separating them would require additional hardware and configuration steps.
upvoted 7 times
...
Alizade
Most Recent 7 months, 3 weeks ago
Selected Answer: C
The MOST likely valid assumption made by the penetration-testing team is that Controllers will not validate the origin of commands.
upvoted 1 times
...
elenakamba
8 months, 3 weeks ago
it should be B.
upvoted 1 times
...
Mr_BuCk3th34D
1 year, 6 months ago
Selected Answer: C
It is likely that the controllers (such as PLCs) in a manufacturing plant's cyber-physical systems are not designed to validate the origin of commands received over the network. This means that they may not have the necessary security measures in place to prevent malicious commands from being injected over the network and executed. In contrast, it is less likely that the supervisory systems or PLCs would act upon commands injected over the network, or that the supervisory systems would detect a malicious injection of code/commands. It is also possible that the supervisory systems and controllers are on separate virtual networks, but this cannot be assumed without further information.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...