Which of the options in the netstat command show the routing table?
Correct : C
The netstat command is a versatile networking tool used for various network-related information-gathering tasks, including displaying all network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.
The specific option -r with the netstat command is used to display the routing table.
This information is critical for troubleshooting network issues and understanding how data is routed through a network, identifying possible points of failure or security vulnerabilities.
Reference
'Linux Network Administrator's Guide,' by O'Reilly Media.
Man pages for netstat in UNIX/Linux distributions.
Start a Discussions
How many firewalls are there in the most common ICS/SCADA architecture?
Correct : D
The most common ICS/SCADA architecture typically includes two firewalls. This dual firewall configuration often involves one firewall placed between the enterprise network and the ICS/SCADA network, and another between the ICS/SCADA network and the plant floor devices. This arrangement, known as a 'demilitarized zone' (DMZ) between the two firewalls, adds an additional layer of security to help isolate and protect sensitive operational technology (OT) environments from threats originating from IT networks. Reference:
National Institute of Standards and Technology (NIST), 'Guide to Industrial Control Systems (ICS) Security'.
Start a Discussions
Which publication from NIST provides guidance on Industrial Control Systems?
Correct : B
NIST Special Publication 800-82, 'Guide to Industrial Control Systems (ICS) Security,' provides guidance on securing industrial control systems, including SCADA systems, distributed control systems (DCS), and other control system configurations such as programmable logic controllers (PLC). It offers practices and recommendations for protecting and securing ICS systems against disruptions, malicious activities, and other threats to their integrity and availability. Reference:
National Institute of Standards and Technology (NIST), 'Guide to Industrial Control Systems (ICS) Security'.
Start a Discussions
What is a vulnerability called that is released before a patch comes out?
Correct : C
A vulnerability that is exploited before the vendor has issued a patch or even before the vulnerability is known to the vendor is referred to as a 'zero-day' vulnerability. The term 'zero-day' refers to the number of days the software vendor has had to address and patch the vulnerability since it was made public---zero, in this case. Reference:
Symantec Security Response, 'Zero Day Initiative'.
Start a Discussions
Which of the following is NOT ICS specific malware?
Correct : C
Code Red is not ICS specific malware; it was a famous worm that targeted computers running Microsoft's IIS web server. Unlike Flame, Havex, and Stuxnet, which were specifically designed to target industrial control systems or perform espionage related to ICS environments, Code Red was aimed at exploiting vulnerabilities in internet-facing software to perform denial-of-service attacks and other malicious activities. Reference:
CERT Coordination Center, 'Code Red Worm Exploiting Buffer Overflow In IIS Indexing Service DLL'.
Start a Discussions