[TABS_R id=10964]
An information security analyst observes anomalous behavior on the SCADA devices in a power plant. This behavior results in the industrial generators overheating and destabilizing the power supply.
Which of the following would BEST identify potential indicators of compromise?
- Use Burp Suite to capture packets to the SCADA device’s IP.
- Use tcpdump to capture packets from the SCADA device IP.
- Use Wireshark to capture packets between SCADA devices and the management system.
- Use Nmap to capture packets from the management system to the SCADA devices.
[TABS_R id=10964]