Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil ICS-SCADA - ICS/SCADA Cyber Security Exam

Page: 2 / 3
Total 75 questions

Who developed the ModBus protocol?

A.

Siemens

B.

BAG

C.

Modicon

D.

Motorola

Which of the following are not a part of the temporal score in the CVSS? (Select all that apply.)

A.

Attack Vector

B.

User Interaction

C.

Reporting Confidence

D.

Remediation Level

In physical to logical asset protections, what threat can be directed against the network?

A.

Elevation of privileges

B.

Flood the switch

C.

All of these

D.

Crack the password

Which of the IEC 62443 Security Levels is identified by a cybercrime/hacker target?

A.

4

B.

3

C.

1

D.

2

At what layer does a switch normally operate?

A.

4

B.

7

C.

2

D.

3

Which of the IEC 62443 security levels is identified by a hacktivist/terrorist target?

A.

1

B.

3

C.

4

D.

2

Which of the following is the name of hacking for a cause?

A.

Lulzec

B.

Anonymous

C.

Hacktivism

D.

Suicide Hackers

Which of the following are valid TCP flags?

A.

None of these

B.

IGP,ACK,SYN,PSH,URG

C.

BGP,FIN,PSH,SYN,ACK

D.

FIN,PSH,URG,RST,SYN

Which component of the IT Security Model is the highest priority in ICS/SCADA Security?

A.

Integrity

B.

Authentication

C.

Availability

D.

Confidentiality

Which component of the IT Security Model is usually the least priority in ICS/SCADA Security?

A.

Integrity

B.

Confidentiality

C.

Availability

D.

Authentication