Which of the following would BEST identify potential indicators of compromise?

Posted by: Pdfprep Category: CS0-002 Tags: , ,

An information security analyst observes anomalous behavior on the SCADA devices in a power plant. This behavior results in the industrial generators overheating and destabilizing the power supply.

Which of the following would BEST identify potential indicators of compromise?
A . Use Burp Suite to capture packets to the SCADA device’s I
C . Use tcpdump to capture packets from the SCADA device I
E . Use Wireshark to capture packets between SCADA devices and the management system.
F . Use Nmap to capture packets from the management system to the SCADA devices.

Answer: C

Leave a Reply

Your email address will not be published.