A security architect for a large multinational manufacturer - CompTIA CAS-005

Question

A security architect for a large, multinational manufacturer needs to design and implement a security solution to monitor traffic.When designing the solution, which of the following threats should the security architect focus on to prevent attacks against the ׀׀¢ network?

Answers
  1. correct
Explanation

Correct Answer: B. Use of any non-DNP3 communication on a DNP3 port

The DNP3 protocol is commonly used in industrial control systems (ICS), particularly for SCADA (Supervisory Control and Data Acquisition) systems. If any communication on a DNP3 port deviates from the expected DNP3 protocol, it could indicate an attack or unauthorized access attempt, such as an intrusion or exploitation of a vulnerability.

Focusing on non-DNP3 communication on a DNP3 port ensures that the security solution specifically monitors for abnormal or malicious traffic directed at critical infrastructure components using a non-compliant protocol. This is especially crucial for protecting ICS environments, which rely heavily on specific communication protocols for control and monitoring.

Why the other options are incorrect:

  • Packets that are the wrong size or length:
    While packet size anomalies might indicate a potential attack or misconfiguration, this is not as specific or directly tied to an ICS environment like DNP3. Generic packet size issues may not always indicate a malicious attack or targeted threat.

  • Multiple solicited responses over time:
    Multiple solicited responses (where responses are received for a request over time) could indicate a DoS (Denial of Service) or a flooding attack. However, this threat is more relevant to network performance rather than a specific attack against industrial control systems using DNP3. While it's important to monitor traffic for anomalies, this doesn't directly address the primary threat for an industrial network.

  • Application of an unsupported encryption algorithm:
    The use of unsupported encryption algorithms could present a security risk, especially in traditional IT environments. However, it is not as relevant to ICS or DNP3 traffic. DNP3 typically uses specific, well-defined methods for securing communication, and monitoring for encryption algorithm weaknesses might be secondary to ensuring protocol-specific attacks (like non-DNP3 communication) are blocked.

No Payment Cards Needed

Related Courses

Discover a range of courses designed to provide you with the knowledge and skills needed to excel in your chosen field.

a prepsaret exam featured image
CompTIA Prep

220-1201 - CompTIA A+ Exam Core 1

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

220-1202 - CompTIA A+ Exam Core 2

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Cloud Essentials+ CLO-002

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Network+ N10-009

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Security+ SY0-701

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Data + DA0-001

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Pentest+

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Linux+ XK0-005

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA CySA+ CSO-003

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA DataSys+ DS0-001

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Tech+ FC0-U71

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Cloud+ CV0-004

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Server+ SK0-005

Start Course Prep

Easy way to pass your test within a week with prepsaret

You don’t need one month to study and pass your test.
With Prepsaret, it takes you a few days to grasp all the concepts needed to pass your exams

View Courses Offered