A penetration tester must identify vulnerabilities within an ICS (Industrial Control System) that is not connected to the internet or enterprise network. Which of the following should the tester utilize to conduct the testing?
Correct Answer: D
Since the ICS is air-gapped (not connected to external networks), the best approach is manual assessment, which involves on-site testing, physical access, and reviewing configurations to identify vulnerabilities.
Option A (Channel scanning) #: This is used for wireless networks, not for isolated ICS systems.
Option B (Stealth scans) #: A stealth scan is a method to avoid detection while scanning, but it still requires network connectivity.
Option C (Source code analysis) #: If the ICS is a proprietary system, source code might not be available.
Also, vulnerabilities could exist outside the code, such as misconfigurations.
Option D (Manual assessment) #: Correct. The ICS is offline, so a manual review of system settings, firmware, and configurations is the best approach.
# Reference: CompTIA PenTest+ PT0-003 Official Guide - ICS & SCADA Testing