New Year Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

ECCouncil ICS-SCADA Dumps

Page: 1 / 8
Total 75 questions

ICS/SCADA Cyber Security Exam Questions and Answers

Question 1

What is the size in bytes of the TCP sequence number in the header?

Options:

A.

2

B.

1

C.

3

D.

4

Question 2

Which component of the IT Security Model is the highest priority in ICS/SCADA Security?

Options:

A.

Integrity

B.

Authentication

C.

Availability

D.

Confidentiality

Question 3

Which component of the IT Security Model is attacked with interruption?

Options:

A.

Confidentiality

B.

Availability

C.

Authentication

D.

Integrity

Question 4

Which of the registrars contains the information for the domain owners in Europe?

Options:

A.

RIPENCC

B.

AFRINIC

C.

LACNIC

D.

ARIN

Question 5

Which mode within IPsec provides a secure connection tunnel between two endpoints AND protects the sender and the receiver?

Options:

A.

Protected

B.

Tunnel

C.

Transport

D.

Covered

Question 6

Which of the following are required functions of information management?

Options:

A.

All of these

B.

Date enrichment

C.

Normalization

D.

Correlation

Question 7

Which of the following steps is used to reveal the IP addressing?

Options:

A.

Footprinting

B.

Surveillance

C.

Cover your tracks

D.

Enumeration

Question 8

What does the SPI within IPsec identify?

Options:

A.

Security Association

B.

Key Exchange

C.

Decryption algorithm

D.

All of these

Question 9

Which of the options in the netstat command show the routing table?

Options:

A.

c

B.

a

C.

r

D.

s

Question 10

Which of the following ports are used for communications in Modbus TCP?

Options:

A.

205

B.

405

C.

505

D.

502

Question 11

At what layer does a switch normally operate?

Options:

A.

4

B.

7

C.

2

D.

3

Question 12

Who developed the ModBus protocol?

Options:

A.

Siemens

B.

BAG

C.

Modicon

D.

Motorola

Question 13

Which component of the IT Security Model is attacked with eavesdropping and interception?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Authentication

Question 14

Which of the following are not a part of the temporal score in the CVSS? (Select all that apply.)

Options:

A.

Attack Vector

B.

User Interaction

C.

Reporting Confidence

D.

Remediation Level

Question 15

Which of the ICS/SCADA generations is considered networked?

Options:

A.

Fourth

B.

Third

C.

Second

D.

First

Question 16

What is the size of the AH in bits with respect to width?

Options:

A.

24

B.

43

C.

16

D.

32

Question 17

Which of the IPsec headers contains the Security Parameters Index (SPI)?

Options:

A.

AH

B.

Both AH and ESP

C.

ESP

D.

ICV

Question 18

What share does the WannaCry ransomware use to connect with the target?

Options:

A.

$IPC

B.

$Admin

C.

$SPOOL

D.

$C

Question 19

What is the maximum size in bytes of an ethernet packet?

Options:

A.

1200

B.

1400

C.

1500

D.

1300

Question 20

What type of protocol is considered connection-oriented?

Options:

A.

UDP

B.

TCP

C.

ICMP

D.

ARP

Question 21

Which publication from NIST provides guidance on Industrial Control Systems?

Options:

A.

NIST SP 800-90

B.

NIST SP 800-82

C.

NIST SP 800-77

D.

NIST SP 800-44

Question 22

A Virtual Private Network (VPN) requires how many Security Associations?

Options:

A.

5

B.

4

C.

3

D.

2

Page: 1 / 8
Total 75 questions