Which of the following are NOT components of an ICS/SCADA network device?
A protocol analyzer that produces raw output is which of the following?
Which of the following is the stance on risk that by default allows traffic with a default permit approach?
Which publication from NIST provides guidance on Industrial Control Systems?
Which of the CVSS metrics refer to the exploit quotient of the vulnerability?
A Virtual Private Network (VPN) requires how many Security Associations?
Which of the following is a component of an IDS?
What form of attack uses a vector that infects a software package?
Which of the IEC 62443 security levels is identified by a hacktivist/terrorist target?
The NIST SP 800-53 defines how many management controls?
What is the default size in bits of the Windows Echo Request packet?
When monitoring a network, you receive an ICMP type 8 packet. What does this represent?
Which of the following was attacked using the Stuxnet malware?
Which of the following is NOT ICS specific malware?
What is a vulnerability called that is released before a patch comes out?
Which of the following components is not part of the Authentication Header (AH)?
How many firewalls are there in the most common ICS/SCADA architecture?
What is the maximum size in bytes of an ethernet packet?
What is the size of the AH in bits with respect to width?
In physical to logical asset protections, what threat can be directed against the network?
Which component of the IT Security Model is the highest priority in ICS/SCADA Security?
Which of the IPsec headers contains the Security Parameters Index (SPI)?