exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 272 discussion

Actual exam question from CompTIA's CS0-002
Question #: 272
Topic #: 1
[All CS0-002 Questions]

While planning segmentation for an ICS environment, a security engineer determines IT resources will need access to devices within the ICS environment without compromising security. To provide the MOST secure access model in this scenario, the jumpbox should be:

  • A. placed in an isolated network segment, authenticated on the IT side, and forwarded into the ICS network.
  • B. placed on the ICS network with a static firewall rule that allows IT network resources to authenticate.
  • C. bridged between the IT and operational technology networks to allow authenticated access.
  • D. placed on the IT side of the network, authenticated, and tunneled into the ICS environment.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
novolyus
1 year, 7 months ago
Selected Answer: A
No every tunnel is an encrypted tunnel. Here does not say anything about encryption, makes sense a jumpbox in A.
upvoted 1 times
...
kiduuu
2 years, 2 months ago
Selected Answer: A
Placing the jumpbox in an isolated network segment provides an additional layer of protection for the ICS environment. Authenticating on the IT side provides control over who has access to the jumpbox. Finally, forwarding into the ICS network provides secure access to devices within the ICS environment without compromising security.
upvoted 1 times
...
kiduuu
2 years, 2 months ago
Selected Answer: C
Placing the jumpbox in an isolated network segment provides an additional layer of protection for the ICS environment. Authenticating on the IT side provides control over who has access to the jumpbox. Finally, forwarding into the ICS network provides secure access to devices within the ICS environment without compromising security.
upvoted 1 times
...
thenewpcgamer
2 years, 2 months ago
"forwarded into the ICS environment seems like a red flag to me. Anyone else?
upvoted 1 times
...
HereToStudy
2 years, 3 months ago
Selected Answer: A
D is less secure because tunneled connections can still be compromised and may not provide sufficient isolation between the IT and ICS environments.
upvoted 1 times
...
db97
2 years, 4 months ago
A jumpbox server is typically places between the trust zone and the DMZ which is in this case the "isolated network"
upvoted 4 times
2Fish
2 years, 3 months ago
I am leaning to A as well. Also, here is more discussions. https://www.examtopics.com/discussions/comptia/view/43037-exam-cs0-002-topic-1-question-20-discussion/
upvoted 2 times
...
...
encxorblood
2 years, 4 months ago
Selected Answer: A
To provide the MOST secure access model in the scenario described, the jumpbox should be placed in an isolated network segment, authenticated on the IT side, and forwarded into the ICS network, which is option A. Option A allows for a secure jumpbox, as it is placed in an isolated network segment, which helps to reduce the risk of the jumpbox being compromised by attackers. The jumpbox is authenticated on the IT side, which helps to ensure that only authorized users are granted access to the ICS environment. By forwarding the jumpbox into the ICS network, it can provide secure access for IT resources without compromising the security of the ICS environment.
upvoted 3 times
...
CatoFong
2 years, 4 months ago
Selected Answer: D
Changing my answer to D.
upvoted 1 times
...
CatoFong
2 years, 5 months ago
Selected Answer: A
the jump box should be segmented from the ICS system network. d. is a good answer but does not provide the added layer of segmentation
upvoted 2 times
CatoFong
2 years, 4 months ago
No. I'm an idiot.
upvoted 4 times
...
...
gnnggnnggnng
2 years, 5 months ago
Selected Answer: D
The most secure access model for a jumpbox in an ICS environment involves placing it on the IT side of the network and authenticating it, then tunneling into the ICS environment. This approach minimizes the exposure of the ICS network to potential threats and provides additional layers of security. By tunneling, only authorized access is allowed, and all traffic between the IT network and the ICS network is encrypted, preventing eavesdropping or tampering. In addition, by placing the jumpbox on the IT side of the network, the security engineer can take advantage of existing IT security controls and processes to further protect the ICS environment.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...