Which of the following is required to determine the correct Security Association?
Answer : D
To determine the correct Security Association (SA) in the context of IPsec, several elements are required:
SPI (Security Parameter Index): Uniquely identifies the SA.
Partner IP address: The address of the endpoint with which the SA is established.
Protocol: Specifies the type of security protocol used (e.g., AH or ESP). All these components collectively define and identify a specific SA for secure communication between parties. Reference:
RFC 4301, 'Security Architecture for the Internet Protocol'.
Which of the following was attacked using the Stuxnet malware?
Answer : A
Stuxnet is a highly sophisticated piece of malware discovered in 2010 that specifically targeted Supervisory Control and Data Acquisition (SCADA) systems used to control and monitor industrial processes.
The primary targets of Stuxnet were Programmable Logic Controllers (PLCs), which are critical components in industrial control systems.
Stuxnet was designed to infect Siemens Step7 software PLCs. It altered the operation of the PLCs to cause physical damage to the connected hardware, famously used against Iran's uranium enrichment facility, where it caused the fast-spinning centrifuges to tear themselves apart.
Reference
Langner, R. 'Stuxnet: Dissecting a Cyberwarfare Weapon.' IEEE Security & Privacy, May-June 2011.
'W32.Stuxnet Dossier,' Symantec Corporation, Version 1.4, February 2011.
How many main score areas are there in the CVSS?2
Answer : C
The Common Vulnerability Scoring System (CVSS) is a framework for rating the severity of security vulnerabilities. CVSS provides three main score areas: Base, Temporal, and Environmental.
Base Score evaluates the intrinsic qualities of a vulnerability.
Temporal Score reflects the characteristics of a vulnerability that change over time.
Environmental Score considers the specific impact of the vulnerability on a particular organization, tailoring the Base and Temporal scores according to the importance of the affected IT asset. Reference:
FIRST, 'Common Vulnerability Scoring System v3.1: Specification Document'.
What type of protocol is represented by the number 6?
Answer : D
The protocol number 6 represents TCP (Transmission Control Protocol) in the Internet Protocol suite. TCP is a core protocol of the Internet Protocol suite and operates at the transport layer, providing reliable, ordered, and error-checked delivery of a stream of bytes between applications running on hosts communicating via an IP network. Reference:
RFC 793, 'Transmission Control Protocol,' which specifies the detailed operation of TCP.
What type of protocol is considered connection-oriented?
Answer : B
TCP (Transmission Control Protocol) is a connection-oriented protocol used in the majority of internet communications.
Connection-oriented protocols like TCP require a connection to be established between the communicating devices before data is transmitted. This ensures reliable and ordered delivery of data.
TCP manages this by establishing a handshake mechanism (TCP three-way handshake) to set up the connection prior to transmitting data and properly terminating the connection once the communication session has completed.
Reference
'TCP/IP Illustrated, Volume 1: The Protocols' by W. Richard Stevens.
Postel, J., 'Transmission Control Protocol,' RFC 793.
Which of the ICS/SCADA generations is considered distributed?
Answer : C
The third generation of ICS/SCADA systems is considered distributed. This generation features systems that are networked and interconnected, typically using a variety of standard communication protocols. This distribution allows for broader connectivity and integration with other systems, enhancing operational flexibility and efficiency but also introducing more vectors for potential cyber threats. Reference:
Joseph Weiss, 'Protecting Industrial Control Systems from Electronic Threats'.
The third generation of ICS/SCADA systems is considered distributed. These systems emerged in the late 1990s and early 2000s and were designed to overcome the limitations of earlier generations by leveraging networked architectures.
Distributed Architecture: Third-generation systems distributed control functions across multiple interconnected devices and systems, providing greater scalability and flexibility.
Network Integration: These systems integrated more extensively with IT networks, allowing for remote monitoring and control.
Standard Protocols: Adoption of standard communication protocols (e.g., Ethernet, TCP/IP) facilitated interoperability and integration with other systems.
Enhanced Redundancy: Improved fault tolerance and redundancy were implemented to ensure system reliability.
Due to these features, the third generation is known as the distributed generation.
Reference
'SCADA Systems,' SCADAHacker, SCADA Generations.
What type of communication protocol does Modbus RTU use?
Answer : C
Modbus RTU (Remote Terminal Unit) is a communication protocol based on a master-slave architecture that uses serial communication. It is one of the earliest communication protocols developed for devices connected over serial lines. Modbus RTU packets are transmitted in a binary format over serial lines such as RS-485 or RS-232. Reference:
Modbus Organization, 'MODBUS over Serial Line Specification and Implementation Guide V1.02'.