A Virtual Private Network (VPN) requires how many Security Associations?
What is the maximum size in bytes of an ethernet packet?
A Security Association is a __________ way connection?
Which mode within IPsec provides a secure connection tunnel between two endpoints AND protects the sender and the receiver?
Which of the following components is not part of the Authentication Header (AH)?
What is a vulnerability called that is released before a patch comes out?
Which of the registrars contains the information for the domain owners in South America?
Which publication from NIST provides guidance on Industrial Control Systems?
Which of the following are valid TCP flags?
Which component of the IT Security Model is attacked with interruption?
Which of the options in the netstat command show the routing table?
Which of the ICS/SCADA generations is considered networked?
Which of the following is NOT ICS specific malware?
Which of the following is considered the best way to counter packet monitoring for a switch?
Which of the IEC 62443 security levels is identified by a hacktivist/terrorist target?
What type of communication protocol does Modbus RTU use?
Which of the following are NOT components of an ICS/SCADA network device?
Which of the following is a weakness of a vulnerability scanner?
Which component of the IT Security Model is attacked with eavesdropping and interception?
Which of the following is the stance that by default has a default deny approach?
Which of the following was attacked using the Stuxnet malware?
Which of the TCP flags represents data in the packet?