Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

ECCouncil ICS-SCADA ICS/SCADA Cyber Security Exam Exam Practice Test

Demo: 22 questions
Total 75 questions

ICS/SCADA Cyber Security Exam Questions and Answers

Question 1

Which of the following steps is used to reveal the IP addressing?

Options:

A.

Footprinting

B.

Surveillance

C.

Cover your tracks

D.

Enumeration

Question 2

How many IPsec modes are there?

Options:

A.

Four

B.

Three

C.

None of these

D.

Two

Question 3

Which of the following components is not part of the Authentication Header (AH)?

Options:

A.

Replay

B.

Authentication

C.

Confidentiality

D.

Integrity

Question 4

Which of the following ports are used for communications in Modbus TCP?

Options:

A.

205

B.

405

C.

505

D.

502

Question 5

Which component of the IT Security Model is attacked with interruption?

Options:

A.

Confidentiality

B.

Availability

C.

Authentication

D.

Integrity

Question 6

Which of the following is NOT an exploit tool?

Options:

A.

Canvas

B.

Core Impact

C.

Metasploit

D.

Nessus

Question 7

What step of the malware infection installs the malware on the target?

Options:

A.

Drive-by

B.

Init

C.

Dropper

D.

Stager

Question 8

Which of the TCP flags represents data in the packet?

Options:

A.

RST

B.

ACK

C.

PSH

D.

FIN

Question 9

A Virtual Private Network (VPN) requires how many Security Associations?

Options:

A.

5

B.

4

C.

3

D.

2

Question 10

A protocol analyzer that produces raw output is which of the following?

Options:

A.

tcpdump

B.

Wireshark

C.

Capsa

D.

Commview

Question 11

Which of the following can be used to view entire copies of web sites?

Options:

A.

Wayback machine

B.

Google Cache

C.

Netcraft

D.

Bing offline

Question 12

What is used in the Modbus protocol to tell the slave to read or write?

Options:

A.

None of these

B.

Function code

C.

Unit ID

D.

Slave command

Question 13

Which component of the IT Security Model is attacked with masquerade?

Options:

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Authentication

Question 14

In physical to logical asset protections, what threat can be directed against the network?

Options:

A.

Elevation of privileges

B.

Flood the switch

C.

All of these

D.

Crack the password

Question 15

What form of attack uses a vector that infects a software package?

Options:

A.

Spam

B.

All of these

C.

Quicksand

D.

Watering Hole

Question 16

Which of the following is required to determine the correct Security Association?

Options:

A.

SPI

B.

Partner IP address

C.

Protocol

D.

All of these

Question 17

The NIST SP 800-53 defines how many management controls?

Options:

A.

6

B.

9

C.

5

D.

7

Question 18

Which of the ICS/SCADA generations is considered monolithic?

Options:

A.

Second

B.

First

C.

Fourth

D.

Third

Question 19

Which mode within IPsec provides a secure connection tunnel between two endpoints AND protects the sender and the receiver?

Options:

A.

Protected

B.

Tunnel

C.

Transport

D.

Covered

Question 20

At what layer does a switch normally operate?

Options:

A.

4

B.

7

C.

2

D.

3

Question 21

What is the maximum size in bytes of an ethernet packet?

Options:

A.

1200

B.

1400

C.

1500

D.

1300

Question 22

Which of the following are not a part of the temporal score in the CVSS? (Select all that apply.)

Options:

A.

Attack Vector

B.

User Interaction

C.

Reporting Confidence

D.

Remediation Level

Demo: 22 questions
Total 75 questions