CAS-004 Exam QuestionsBrowse all questions from this exam

CAS-004 Exam - Question 226


A server in a manufacturing environment is running an end-of-life operating system. The vulnerability management team is recommending that the server be upgraded to a supported operating system, but the ICS software running on the server is not compatible with modem operating systems. Which of the following compensating controls should be implemented to BEST protect the server?

Show Answer
Correct Answer: CD

A Host-based Intrusion Prevention System (HIPS) is the best choice to protect a server running an end-of-life operating system. HIPS actively monitors and analyzes the network traffic and system activities on the server to identify and prevent suspicious behavior. This compensating control can detect and block unauthorized access or activities, effectively addressing the vulnerabilities that come with using an unsupported operating system. Unlike other options, HIPS provides comprehensive protection by recognizing and mitigating potential threats in real-time.

Discussion

17 comments
Sign in to comment
FoxTrotDGOption: A
Mar 23, 2023

I'm going with A. It directly addresses the risk of unauthorized application execution on the end-of-life operating system. C and D may not be as effective in protecting against zero-day exploits or targeted attacks that exploit vulnerabilities in an end-of-life operating system

Ariel235788
Oct 2, 2023

Fully agree, and ChatGPT does as well

OdinAtlasSteelOption: C
Nov 29, 2023

Its C, HIPS. A HIPS is the best tool available here by a mile. Application allow list? Doesn't do anything to stop an attack, only prevents users from installing malware. Antivirus? Not comprehensive enough. Host-based firewall? Not effective at actively detecting and stopping threats. It's C 1000%.

Trap_D0_rOption: C
Jan 8, 2024

It is absolutely C. The Server is EOL, and you're stuck with it (can't upgrade). It may already have a host based firewall, it may not. Regardless, a HIPS is a comprehensive solution to secure a piece of legacy hardware that you can't get rid of without crippling your "manufacturing environment." Don't listen to everyone voting for A or D, they are lying to you. Or illiterate. Or both.

ddcnsd65
Apr 3, 2024

If you read the question correctly you'd know The server is "NOT" end of life, the "Operating System" is "END OF LIFE"

ThatGuyOverThereOption: C
Oct 27, 2023

Host-based Intrusion Prevention System (HIPS)

abrubOption: C
Jan 7, 2024

Its C, HIPS. A HIPS is the best tool available here by a mile. Application allow list? Doesn't do anything to stop an attack, only prevents users from installing malware. Antivirus? Not comprehensive enough. Host-based firewall? Not effective at actively detecting and stopping threats. It's C 1000%.

ElDirecOption: A
Feb 8, 2024

Application allow list: This control focuses on restricting the execution of unauthorized applications, including potential malware, on the server. This is particularly relevant in ICS environments where security needs prioritize known and authorized software for process control and stability.

userguy890Option: A
Feb 22, 2024

The only thing that protects against 0 days in the list. It is the best option. idk why there are split voting on this...

AnarckiiOption: D
Jan 2, 2024

Controlled Network Access: A host-based firewall can be configured to control and restrict network traffic to and from the server. This helps in preventing unauthorized access and potential network attacks. Filtering Inbound and Outbound Traffic: The firewall can be configured to allow only necessary inbound and outbound network traffic, blocking any attempts by malicious actors to exploit vulnerabilities in the outdated operating system. Protecting Against Exploits: If there are known vulnerabilities in the end-of-life operating system that cannot be patched, a host-based firewall can act as a barrier, preventing exploitation of these vulnerabilities by filtering malicious traffic. Enhancing Security Posture: While not a substitute for upgrading the operating system, a host-based firewall adds an additional layer of defense by controlling network communication. It helps in reducing the attack surface and mitigating the risks associated with running an outdated OS.

Anarckii
Jan 5, 2024

Changing to C as we want to focus on possible attack. Firewalls aren't always protective against attacks so a step forward is HIPS

Delab202Option: D
Jan 6, 2024

Implementing a host-based firewall is a crucial compensating control to enhance the security of a server, especially in a situation where the operating system cannot be upgraded due to compatibility issues with ICS software. Here are some key considerations for implementing a host-based firewall: Chat GPT

hb0011Option: A
Jan 12, 2024

Yep it's A

Desparate2PassOption: A
Jan 25, 2024

Going with A. You need to isolate the server to only perform what is absolutely necessary to best mitigate against Zero Day Attacks. A HIPS recognizes signatures but does not offer best protection against Zero Day.

BlingyOption: A
Feb 6, 2024

Throwing my weight towards A too

AlphaF0rceOption: A
Feb 23, 2024

A. Application allow list Based on the comments, this is the correct answer. Keywords: "BEST...compensating control".

loucrassOption: C
Apr 26, 2024

The answer is (C) according to ChatGPT

ninjachuletaOption: C
Jun 7, 2024

Given the constraints of the industrial control system (ICS) software being incompatible with modern operating systems, the best compensating control to protect the server running the end-of-life operating system would be: C. HIPS (Host-based Intrusion Prevention System) HIPS monitors and analyzes network traffic and system activities on individual hosts to identify suspicious behavior and prevent unauthorized access or activities. It can provide additional protection against vulnerabilities in the end-of-life operating system by detecting and blocking malicious activities in real-time. This helps mitigate the risks associated with using an unsupported operating system while maintaining the necessary functionality for the ICS software to operate.

SangSangOption: A
Jun 10, 2024

Application allow list, network white list, ... are the most common compensating controls

SangSang
Jun 10, 2024

You done need to fight against virus or malware if they aren't allow to execute from the beginning

EAlonsoOption: A
Jul 13, 2024

A. I like HIPS but in an ICS the servers need to be up and running.