Multiple Choice
An information security analyst observes anomalous behavior on the SCADA devices in a power plant. This behavior results in the industrial generators overheating and destabilizing the power supply. Which of the following would BEST identify potential indicators of compromise?
A) Use Burp Suite to capture packets to the SCADA device's IP.
B) Use tcpdump to capture packets from the SCADA device IP.
C) Use Wireshark to capture packets between SCADA devices and the management system.
D) Use Nmap to capture packets from the management system to the SCADA devices.
Correct Answer:

Verified
Correct Answer:
Verified
Q126: Which of the following software security best
Q127: A security analyst is investigating a malware
Q128: A development team is testing a new
Q129: A bad actor bypasses authentication and reveals
Q130: A monthly job to install approved vendor
Q132: A security analyst is investigating a compromised
Q133: The security team at a large corporation
Q134: Which of the following are components of
Q135: When attempting to do a stealth scan
Q136: A cybersecurity analyst is contributing to a