Which of the following is the most common vulnerability found in SCADA systems that can lead to unauthorized access?
Think about what attackers often exploit first when targeting SCADA devices.
Many SCADA systems use default or weak passwords, making them vulnerable to unauthorized access. Strong passwords and credential management are critical.
You run a network scan on a SCADA device using the command nmap -sV 192.168.1.100. Which output indicates a vulnerable service running?
Starting Nmap 7.80 ( https://nmap.org ) at 2024-06-01 10:00 Nmap scan report for 192.168.1.100 Host is up (0.0010s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION 502/tcp open modbus Modbus protocol 80/tcp open http Apache httpd 2.2.15 23/tcp open telnet Linux telnetd Service Info: OS: Linux
Consider which service is known for transmitting data without encryption.
Telnet transmits data in plain text and is considered insecure. Its presence on SCADA devices is a vulnerability.
A SCADA system suddenly stops communicating with remote RTUs (Remote Terminal Units). Which configuration issue is the most likely cause?
Think about what could block the communication protocol used by SCADA.
If the firewall blocks port 502, which Modbus TCP uses, communication between SCADA and RTUs will fail.
Which of the following is the best practice to secure communication between SCADA control centers and field devices?
Think about how to protect data traveling over networks.
Using VPN tunnels with strong encryption protects SCADA communication from interception and tampering.
Arrange the following steps in the correct order to respond effectively to a malware infection in a SCADA system.
Think about immediate containment before analysis and recovery.
First isolate infected devices to stop spread, then notify teams, analyze malware, and finally restore from backups.