Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 226

A server in a manufacturing environment is running an end-of-life operating system. The vulnerability management team is recommending that the server be upgraded to a supported operating system, but the ICS software running on the server is not compatible with modem operating systems. Which of the following compensating controls should be implemented to BEST protect the server?

    Correct Answer: C

    A Host-based Intrusion Prevention System (HIPS) is the best choice to protect a server running an end-of-life operating system. HIPS actively monitors and analyzes the network traffic and system activities on the server to identify and prevent suspicious behavior. This compensating control can detect and block unauthorized access or activities, effectively addressing the vulnerabilities that come with using an unsupported operating system. Unlike other options, HIPS provides comprehensive protection by recognizing and mitigating potential threats in real-time.

Discussion
FoxTrotDGOption: A

I'm going with A. It directly addresses the risk of unauthorized application execution on the end-of-life operating system. C and D may not be as effective in protecting against zero-day exploits or targeted attacks that exploit vulnerabilities in an end-of-life operating system

Ariel235788

Fully agree, and ChatGPT does as well

Trap_D0_rOption: C

It is absolutely C. The Server is EOL, and you're stuck with it (can't upgrade). It may already have a host based firewall, it may not. Regardless, a HIPS is a comprehensive solution to secure a piece of legacy hardware that you can't get rid of without crippling your "manufacturing environment." Don't listen to everyone voting for A or D, they are lying to you. Or illiterate. Or both.

ddcnsd65

If you read the question correctly you'd know The server is "NOT" end of life, the "Operating System" is "END OF LIFE"

OdinAtlasSteelOption: C

Its C, HIPS. A HIPS is the best tool available here by a mile. Application allow list? Doesn't do anything to stop an attack, only prevents users from installing malware. Antivirus? Not comprehensive enough. Host-based firewall? Not effective at actively detecting and stopping threats. It's C 1000%.

userguy890Option: A

The only thing that protects against 0 days in the list. It is the best option. idk why there are split voting on this...

ElDirecOption: A

Application allow list: This control focuses on restricting the execution of unauthorized applications, including potential malware, on the server. This is particularly relevant in ICS environments where security needs prioritize known and authorized software for process control and stability.

abrubOption: C

Its C, HIPS. A HIPS is the best tool available here by a mile. Application allow list? Doesn't do anything to stop an attack, only prevents users from installing malware. Antivirus? Not comprehensive enough. Host-based firewall? Not effective at actively detecting and stopping threats. It's C 1000%.

ThatGuyOverThereOption: C

Host-based Intrusion Prevention System (HIPS)

EAlonsoOption: A

A. I like HIPS but in an ICS the servers need to be up and running.

SangSangOption: A

Application allow list, network white list, ... are the most common compensating controls

SangSang

You done need to fight against virus or malware if they aren't allow to execute from the beginning

ninjachuletaOption: C

Given the constraints of the industrial control system (ICS) software being incompatible with modern operating systems, the best compensating control to protect the server running the end-of-life operating system would be: C. HIPS (Host-based Intrusion Prevention System) HIPS monitors and analyzes network traffic and system activities on individual hosts to identify suspicious behavior and prevent unauthorized access or activities. It can provide additional protection against vulnerabilities in the end-of-life operating system by detecting and blocking malicious activities in real-time. This helps mitigate the risks associated with using an unsupported operating system while maintaining the necessary functionality for the ICS software to operate.

loucrassOption: C

The answer is (C) according to ChatGPT

AlphaF0rceOption: A

A. Application allow list Based on the comments, this is the correct answer. Keywords: "BEST...compensating control".

BlingyOption: A

Throwing my weight towards A too

Desparate2PassOption: A

Going with A. You need to isolate the server to only perform what is absolutely necessary to best mitigate against Zero Day Attacks. A HIPS recognizes signatures but does not offer best protection against Zero Day.

hb0011Option: A

Yep it's A

Delab202Option: D

Implementing a host-based firewall is a crucial compensating control to enhance the security of a server, especially in a situation where the operating system cannot be upgraded due to compatibility issues with ICS software. Here are some key considerations for implementing a host-based firewall: Chat GPT

AnarckiiOption: D

Controlled Network Access: A host-based firewall can be configured to control and restrict network traffic to and from the server. This helps in preventing unauthorized access and potential network attacks. Filtering Inbound and Outbound Traffic: The firewall can be configured to allow only necessary inbound and outbound network traffic, blocking any attempts by malicious actors to exploit vulnerabilities in the outdated operating system. Protecting Against Exploits: If there are known vulnerabilities in the end-of-life operating system that cannot be patched, a host-based firewall can act as a barrier, preventing exploitation of these vulnerabilities by filtering malicious traffic. Enhancing Security Posture: While not a substitute for upgrading the operating system, a host-based firewall adds an additional layer of defense by controlling network communication. It helps in reducing the attack surface and mitigating the risks associated with running an outdated OS.

Anarckii

Changing to C as we want to focus on possible attack. Firewalls aren't always protective against attacks so a step forward is HIPS