VULNERABILITY TYPES EXAM QUESTIONS AND
ANSWERS WITH COMPLETE SOLUTIONS GRADED A++
Inadequate access controls applied
CONFIGURATION AND MAINTENANCE
Inadequate authentication between wireless clients and access points
COMMUNICATION AND NETWORK
Inadequate testing of security changes
CONFIGURATION AND MAINTENANCE
Radio frequency and electro-magnetic pulse (EMP)
PHYSICAL
Poor remote access controls
CONFIGURATION AND MAINTENANCE
Control network services not within the control net
ARCHITECTURE AND DESIGN
Unauthorized personnel have physical access to equipment
PHYSICAL
Data unprotected on portable
CONFIGURATION AND MAINTENANCE
Improper data linking
, CONFIGURATION AND MAINTENANCE
Hardware, firmware, and software not under configuration management
CONFIGURATION AND MAINTENANCE
OS and vendor software patches may not be developed until significantly after
security vulnerabilities are found
CONFIGURATION AND MAINTENANCE
No IACS-specific contingency plan
Policy and Procedure
Lack of redundancy for critical components
Policy and Procedure
Authentication of users, data or devices is substandard or nonexistent
COMMUNICATION AND NETWORK
Installed security capabilities not enabled by default
SOFTWARE
Inadequate collection of event data history
ARCHITECTURE AND DESIGN
Lack of backup power
PHYSICAL
Lack of integrity checking for communications
COMMUNICATION AND NETWORK
OS and application security patches are not maintained or vendor declines to
patch vulnerability
CONFIGURATION AND MAINTENANCE