Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 421

A security engineer at a manufacturing facility is trying to determine whether any of the OT devices are susceptible to a recently announced vulnerability. Which of the following is the best way for the engineer to detect exploitable vulnerabilities?

    Correct Answer: A

    Utilizing a passive vulnerability scanner on the network is the best method to detect exploitable vulnerabilities in OT devices. OT environments are highly sensitive to disruptions, and passive scanners can monitor network traffic and identify vulnerabilities without interfering with the operation of the devices. This ensures the safety and stability of the OT systems while still providing the necessary information to address potential vulnerabilities.

Discussion
cf13076Option: D

I apologize for the oversight. Let's attempt another response. D. Review software inventory for vulnerable versions. Reviewing the software inventory for vulnerable versions can help the security engineer identify any OT devices that are running software versions known to have vulnerabilities. By checking the software versions against known vulnerability databases, the engineer can determine if any devices are susceptible to the recently announced vulnerability and take appropriate action to address the issue.

23169fdOption: A

Non-intrusive: It monitors network traffic without actively probing devices, thus avoiding potential disruptions to critical OT operations. Effective: Identifies vulnerabilities by analyzing existing data flows and configurations. Recommended: Aligned with best practices for OT environments, as outlined by NIST and the SANS Institute

MacherGamingOption: D

D - Review software inventory for vulnerable versions: This is going to tell you exactly what vulnerabilities could impact which systems. Passive Scanning isn't going to work for all OT devices mainly because they aren't always communicating and/or may not respond to scanner probes.

isaphiltrickOption: A

Passive vulnerability scanning is the best approach for detecting vulnerabilities in Operational Technology (OT) devices without disrupting their operation. OT environments are typically sensitive to disruptions, and active scanning methods can potentially interfere with the devices' functions. A passive scanner monitors the network traffic and detects vulnerabilities by analyzing the data without sending intrusive probes, ensuring the stability and safety of the OT devices.