This project uses MITRE ATT&CK Matrix for ICS v 17. Open the link below in another tab and use it to answer the questions below. Each answer is worth 2 points.
MITRE ATT&CK Matrix for ICS v 17
OT 130.1: Rogue Masters Mitigation
What mitigation to prevent the Rogue Masters technique prevents devices from accepting connections from unauthorized systems? The flag is the M number for that mitigation, like M0101.OT 130.2: Native API Detection
What detection method works on the RNative API technique? The flag is the DS number for that mitigation, like DS0101.OT 130.3: Ethernet Card
What persistence technique modifies the code running on the Ethernet card? The flag is the T number for that technique, like T0891.OT 130.4: Event Logs
What evasion technique includes deleting event logs? The flag is the T number for that mitigation, like T0101.OT 130.5: M0808
What discovery technique is mitigated by M0808? The flag is the T number for that mitigation, like T0101.OT 130.6: MS17-010
An attacker performs lateral movement using the MS17-010 vulnerability. What technique is that? The flag is the T number for that mitigation, like T0101.OT 130.7: No Mitigation
What collection technique has no effective mitigation, and targets Jump Hosts? The flag is the T number for that mitigation, like T0101.OT 130.8: Password
What Inhibit Response Function technique includes adding a password to a system that lacks one? The flag is the T number for that mitigation, like T0101.OT 130.9: Errors
What Impair Process Control technique involves sending false error messages to the operators? The flag is the T number for that mitigation, like T0101.OT 130.10: Documents
What Impact technique includes downloading design documents? The flag is the T number for that mitigation, like T0101.
Posted 4-24-25