Certified Ethical Hacker (CEH) Practice Question

During a security assessment of an electrical substation, you discover that the SCADA control LAN is bridged to the corporate network through an unmanaged switch and that PLCs exchange unauthenticated Modbus/TCP traffic in clear text. To address the OT security principles of network segmentation and least functionality while introducing minimal latency to real-time control traffic, what should you recommend first?

  • Configure 802.1X port-based authentication on every PLC and HMI in the control network.

  • Enable SNMPv3 on the existing switch to secure its management interface and monitor configuration changes.

  • Deploy an industrial firewall that performs protocol-aware filtering between the corporate network and the SCADA control network.

  • Install host-based intrusion detection agents directly on each PLC to monitor traffic locally.

Certified Ethical Hacker (CEH)
Mobile Platform, IoT, and OT Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot