ICS/SCADA Cyber Security Exam Questions and Answers
What is the size in bytes of the TCP sequence number in the header?
Which component of the IT Security Model is the highest priority in ICS/SCADA Security?
Which component of the IT Security Model is attacked with interruption?
Which of the registrars contains the information for the domain owners in Europe?
Which mode within IPsec provides a secure connection tunnel between two endpoints AND protects the sender and the receiver?
Which of the following are required functions of information management?
Which of the following steps is used to reveal the IP addressing?
What does the SPI within IPsec identify?
Which of the options in the netstat command show the routing table?
Which of the following ports are used for communications in Modbus TCP?
At what layer does a switch normally operate?
Who developed the ModBus protocol?
Which component of the IT Security Model is attacked with eavesdropping and interception?
Which of the following are not a part of the temporal score in the CVSS? (Select all that apply.)
Which of the ICS/SCADA generations is considered networked?
What is the size of the AH in bits with respect to width?
Which of the IPsec headers contains the Security Parameters Index (SPI)?
What share does the WannaCry ransomware use to connect with the target?
What is the maximum size in bytes of an ethernet packet?
What type of protocol is considered connection-oriented?
Which publication from NIST provides guidance on Industrial Control Systems?
A Virtual Private Network (VPN) requires how many Security Associations?