Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

ECCouncil ICS-SCADA ICS/SCADA Cyber Security Exam Exam Practice Test

Page: 1 / 8
Total 75 questions

ICS/SCADA Cyber Security Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

Which of the following are NOT components of an ICS/SCADA network device?

Options:

A.

Low processing threshold

B.

Legacy systems

C.

High bandwidth networks

D.

Weak network stack

Question 2

A protocol analyzer that produces raw output is which of the following?

Options:

A.

tcpdump

B.

Wireshark

C.

Capsa

D.

Commview

Question 3

Which of the following is the stance on risk that by default allows traffic with a default permit approach?

Options:

A.

Paranoid

B.

Prudent

C.

Promiscuous

D.

Permissive

Question 4

Which publication from NIST provides guidance on Industrial Control Systems?

Options:

A.

NIST SP 800-90

B.

NIST SP 800-82

C.

NIST SP 800-77

D.

NIST SP 800-44

Question 5

Which of the CVSS metrics refer to the exploit quotient of the vulnerability?

Options:

A.

Temporal

B.

Environmental

C.

IBase

D.

All of these

Question 6

A Virtual Private Network (VPN) requires how many Security Associations?

Options:

A.

5

B.

4

C.

3

D.

2

Question 7

Which of the following is a component of an IDS?

Options:

A.

All of these

B.

Respond

C.

Detect

D.

Monitor

Question 8

What form of attack uses a vector that infects a software package?

Options:

A.

Spam

B.

All of these

C.

Quicksand

D.

Watering Hole

Question 9

Which of the IEC 62443 security levels is identified by a hacktivist/terrorist target?

Options:

A.

1

B.

3

C.

4

D.

2

Question 10

The NIST SP 800-53 defines how many management controls?

Options:

A.

6

B.

9

C.

5

D.

7

Question 11

What is the default size in bits of the Windows Echo Request packet?

Options:

A.

28

B.

24

C.

58

D.

32

Question 12

When monitoring a network, you receive an ICMP type 8 packet. What does this represent?

Options:

A.

Echo request

B.

Echo start

C.

Echo recall

D.

Echo reply

Question 13

Which of the following was attacked using the Stuxnet malware?

Options:

A.

PLCS

B.

PLC3

C.

All of these

D.

PLC7

Question 14

Which of the following is NOT ICS specific malware?

Options:

A.

Flame

B.

Ha vex

C.

Code Red

D.

Stuxnet

Question 15

What is a vulnerability called that is released before a patch comes out?

Options:

A.

Initial

B.

Pre-release

C.

Zero day

D.

First

Question 16

Which of the following components is not part of the Authentication Header (AH)?

Options:

A.

Replay

B.

Authentication

C.

Confidentiality

D.

Integrity

Question 17

How many firewalls are there in the most common ICS/SCADA architecture?

Options:

A.

3

B.

1

C.

None of these

D.

2

Question 18

What is the maximum size in bytes of an ethernet packet?

Options:

A.

1200

B.

1400

C.

1500

D.

1300

Question 19

What is the size of the AH in bits with respect to width?

Options:

A.

24

B.

43

C.

16

D.

32

Question 20

In physical to logical asset protections, what threat can be directed against the network?

Options:

A.

Elevation of privileges

B.

Flood the switch

C.

All of these

D.

Crack the password

Question 21

Which component of the IT Security Model is the highest priority in ICS/SCADA Security?

Options:

A.

Integrity

B.

Authentication

C.

Availability

D.

Confidentiality

Question 22

Which of the IPsec headers contains the Security Parameters Index (SPI)?

Options:

A.

AH

B.

Both AH and ESP

C.

ESP

D.

ICV

Page: 1 / 8
Total 75 questions