Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil ICS-SCADA - ICS/SCADA Cyber Security Exam

Page: 1 / 3
Total 75 questions

What share does the WannaCry ransomware use to connect with the target?

A.

$IPC

B.

$Admin

C.

$SPOOL

D.

$C

Which of the following is a component of an IDS?

A.

All of these

B.

Respond

C.

Detect

D.

Monitor

Which of the following is the stance on risk that by default allows traffic with a default permit approach?

A.

Paranoid

B.

Prudent

C.

Promiscuous

D.

Permissive

What step of the malware infection installs the malware on the target?

A.

Drive-by

B.

Init

C.

Dropper

D.

Stager

Which component of the IT Security Model is attacked with interruption?

A.

Confidentiality

B.

Availability

C.

Authentication

D.

Integrity

A Virtual Private Network (VPN) requires how many Security Associations?

A.

5

B.

4

C.

3

D.

2

Which of the following is a weakness of a vulnerability scanner?

A.

Detect known vulnerabilities

B.

Not designed to go through filters

C.

Work best on a local network

D.

Maintains a signature database

Which publication from NIST provides guidance on Industrial Control Systems?

A.

NIST SP 800-90

B.

NIST SP 800-82

C.

NIST SP 800-77

D.

NIST SP 800-44

What is the size in bytes of the TCP sequence number in the header?

A.

2

B.

1

C.

3

D.

4

How many IPsec modes are there?

A.

Four

B.

Three

C.

None of these

D.

Two