PT0-003 · Question #158
PT0-003 Question #158: Real Exam Question with Answer & Explanation
The correct answer is A: Utilizing port mirroring on a firewall appliance. Using port mirroring on a firewall appliance is the safest and most non-intrusive way to validate if the application encrypts data in transit. Why Port Mirroring? Port mirroring (SPAN) enables traffic from the ICS system to be copied and sent to a monitoring device without affect
Question
A client warns the assessment team that an ICS application is maintained by the manufacturer. Any tampering of the host could void the enterprise support terms of use. Which of the following techniques would be most effective to validate whether the application encrypts communications in transit?
Options
- AUtilizing port mirroring on a firewall appliance
- BInstalling packet capture software on the server
- CReconfiguring the application to use a proxy
- DRequesting that certificate pinning be disabled
Explanation
Using port mirroring on a firewall appliance is the safest and most non-intrusive way to validate if the application encrypts data in transit. Why Port Mirroring? Port mirroring (SPAN) enables traffic from the ICS system to be copied and sent to a monitoring device without affecting the host system. This avoids any tampering with the application or host, preserving enterprise support terms.
Topics
Community Discussion
No community discussion yet for this question.