ECCouncil ICS-SCADA - ICS/SCADA Cyber Security Exam
Who developed the ModBus protocol?
Which of the following are not a part of the temporal score in the CVSS? (Select all that apply.)
In physical to logical asset protections, what threat can be directed against the network?
Which of the IEC 62443 Security Levels is identified by a cybercrime/hacker target?
At what layer does a switch normally operate?
Which of the IEC 62443 security levels is identified by a hacktivist/terrorist target?
Which of the following is the name of hacking for a cause?
Which of the following are valid TCP flags?
Which component of the IT Security Model is the highest priority in ICS/SCADA Security?
Which component of the IT Security Model is usually the least priority in ICS/SCADA Security?