Winter Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

ECCouncil ICS-SCADA ICS/SCADA Cyber Security Exam Exam Practice Test

Page: 1 / 8
Total 75 questions

ICS/SCADA Cyber Security Exam Questions and Answers

Question 1

A Virtual Private Network (VPN) requires how many Security Associations?

Options:

A.

5

B.

4

C.

3

D.

2

Question 2

What is the maximum size in bytes of an ethernet packet?

Options:

A.

1200

B.

1400

C.

1500

D.

1300

Question 3

A Security Association is a __________ way connection?

Options:

A.

One

B.

None of these

C.

Two

D.

Three

Question 4

Which mode within IPsec provides a secure connection tunnel between two endpoints AND protects the sender and the receiver?

Options:

A.

Protected

B.

Tunnel

C.

Transport

D.

Covered

Question 5

Which of the following components is not part of the Authentication Header (AH)?

Options:

A.

Replay

B.

Authentication

C.

Confidentiality

D.

Integrity

Question 6

What is a vulnerability called that is released before a patch comes out?

Options:

A.

Initial

B.

Pre-release

C.

Zero day

D.

First

Question 7

Which of the registrars contains the information for the domain owners in South America?

Options:

A.

AFRINIC

B.

ARIN

C.

LACNIC

D.

RIPENCC

Question 8

Which publication from NIST provides guidance on Industrial Control Systems?

Options:

A.

NIST SP 800-90

B.

NIST SP 800-82

C.

NIST SP 800-77

D.

NIST SP 800-44

Question 9

Which of the following are valid TCP flags?

Options:

A.

None of these

B.

IGP,ACK,SYN,PSH,URG

C.

BGP,FIN,PSH,SYN,ACK

D.

FIN,PSH,URG,RST,SYN

Question 10

Which component of the IT Security Model is attacked with interruption?

Options:

A.

Confidentiality

B.

Availability

C.

Authentication

D.

Integrity

Question 11

Which of the options in the netstat command show the routing table?

Options:

A.

c

B.

a

C.

r

D.

s

Question 12

Which of the ICS/SCADA generations is considered networked?

Options:

A.

Fourth

B.

Third

C.

Second

D.

First

Question 13

Which of the following is NOT ICS specific malware?

Options:

A.

Flame

B.

Ha vex

C.

Code Red

D.

Stuxnet

Question 14

Which of the following is considered the best way to counter packet monitoring for a switch?

Options:

A.

Tap

B.

Duplication

C.

SPAN

D.

Port mirror

Question 15

Which of the IEC 62443 security levels is identified by a hacktivist/terrorist target?

Options:

A.

1

B.

3

C.

4

D.

2

Question 16

What type of communication protocol does Modbus RTU use?

Options:

A.

UDP

B.

ICMP

C.

Serial

D.

SSTP

Question 17

Which of the following are NOT components of an ICS/SCADA network device?

Options:

A.

Low processing threshold

B.

Legacy systems

C.

High bandwidth networks

D.

Weak network stack

Question 18

Which of the following is a weakness of a vulnerability scanner?

Options:

A.

Detect known vulnerabilities

B.

Not designed to go through filters

C.

Work best on a local network

D.

Maintains a signature database

Question 19

Which component of the IT Security Model is attacked with eavesdropping and interception?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Authentication

Question 20

Which of the following is the stance that by default has a default deny approach?

Options:

A.

Permissive

B.

Paranoid

C.

Promiscuous

D.

Prudent

Question 21

Which of the following was attacked using the Stuxnet malware?

Options:

A.

PLCS

B.

PLC3

C.

All of these

D.

PLC7

Question 22

Which of the TCP flags represents data in the packet?

Options:

A.

RST

B.

ACK

C.

PSH

D.

FIN

Page: 1 / 8
Total 75 questions