Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam ICS-SCADA Topic 8 Question 25 Discussion

Actual exam question for Eccouncil's ICS-SCADA exam
Question #: 25
Topic #: 8
[All ICS-SCADA Questions]

Which component of the IT Security Model is attacked with masquerade?

Show Suggested Answer Hide Answer
Suggested Answer: A

The Common Vulnerability Scoring System (CVSS) uses several metrics to assess the severity of vulnerabilities. Among them, the Temporal metric group specifically reflects the exploit quotient of a vulnerability.

Temporal metrics consider factors that change over time after a vulnerability is initially assessed. These include:

Exploit Code Maturity: This assesses the likelihood of the vulnerability being exploited based on the availability and maturity of exploit code.

Remediation Level: The level of remediation available for the vulnerability, which influences the ease of mitigation.

Report Confidence: This metric measures the reliability of the reports about the vulnerability.

These temporal factors directly affect the exploitability and potential threat posed by a vulnerability, adjusting the base score to provide a more current view of the risk.

Reference

Common Vulnerability Scoring System v3.1: User Guide.

'Understanding CVSS,' by FIRST (Forum of Incident Response and Security Teams).


Contribute your Thoughts:

Nan
4 days ago
I'm not sure, but I think it's D) Authentication too. It makes sense because masquerade involves impersonating a legitimate user.
upvoted 0 times
...
Laine
5 days ago
I'm pretty sure it's D. Authentication, since masquerade attacks try to impersonate a legitimate user or system.
upvoted 0 times
...
Madalyn
8 days ago
I agree with Belen. Masquerade attacks target the authentication component.
upvoted 0 times
...
Belen
12 days ago
I think the answer is D) Authentication.
upvoted 0 times
...

Save Cancel