Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

ICS-SCADA ICS/SCADA Cyber Security Exam Questions and Answers

Questions 4

What is a vulnerability called that is released before a patch comes out?

Options:

A.

Initial

B.

Pre-release

C.

Zero day

D.

First

Buy Now
Questions 5

What is the maximum size in bytes of an ethernet packet?

Options:

A.

1200

B.

1400

C.

1500

D.

1300

Buy Now
Questions 6

Which of the following is NOT ICS specific malware?

Options:

A.

Flame

B.

Ha vex

C.

Code Red

D.

Stuxnet

Buy Now
Questions 7

Which of the following are required functions of information management?

Options:

A.

All of these

B.

Date enrichment

C.

Normalization

D.

Correlation

Buy Now
Questions 8

Which of the following is a component of an IDS?

Options:

A.

All of these

B.

Respond

C.

Detect

D.

Monitor

Buy Now
Questions 9

Which component of the IT Security Model is the highest priority in ICS/SCADA Security?

Options:

A.

Integrity

B.

Authentication

C.

Availability

D.

Confidentiality

Buy Now
Questions 10

What is the extension of nmap scripts?

Options:

A.

.nsn

B.

.nse

C.

.nsv

D.

.ns

Buy Now
Questions 11

Which component of the IT Security Model is usually the least priority in ICS/SCADA Security?

Options:

A.

Integrity

B.

Confidentiality

C.

Availability

D.

Authentication

Buy Now
Questions 12

What is the default size in bits of the Windows Echo Request packet?

Options:

A.

28

B.

24

C.

58

D.

32

Buy Now
Questions 13

Which component of the IT Security Model is attacked with masquerade?

Options:

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Authentication

Buy Now
Questions 14

Which type of Intrusion Prevention System can monitor and validate encrypted data?

Options:

A.

Memory

B.

Network

C.

Host

D.

Anomaly

Buy Now
Questions 15

What version of SMB did the WannaCry ransomware attack?

Options:

A.

All of these

B.

2

C.

1

D.

3

Buy Now
Questions 16

How many IPsec rules are there in Microsoft Firewall configuration?

Options:

A.

2

B.

5

C.

3

D.

4

Buy Now
Questions 17

Which component of the IT Security Model is attacked with eavesdropping and interception?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Authentication

Buy Now
Questions 18

In physical to logical asset protections, what threat can be directed against the network?

Options:

A.

Elevation of privileges

B.

Flood the switch

C.

All of these

D.

Crack the password

Buy Now
Questions 19

Which of the following is the stance that by default has a default deny approach?

Options:

A.

Permissive

B.

Paranoid

C.

Promiscuous

D.

Prudent

Buy Now
Questions 20

Which of the IPsec headers contains the Security Parameters Index (SPI)?

Options:

A.

AH

B.

Both AH and ESP

C.

ESP

D.

ICV

Buy Now
Questions 21

Which of the following is NOT an exploit tool?

Options:

A.

Canvas

B.

Core Impact

C.

Metasploit

D.

Nessus

Buy Now
Questions 22

The NIST SP 800-53 defines how many management controls?

Options:

A.

6

B.

9

C.

5

D.

7

Buy Now
Exam Code: ICS-SCADA
Exam Name: ICS/SCADA Cyber Security Exam
Last Update: Nov 21, 2024
Questions: 75
ICS-SCADA pdf

ICS-SCADA PDF

$28  $80
ICS-SCADA Engine

ICS-SCADA Testing Engine

$33.25  $95
ICS-SCADA PDF + Engine

ICS-SCADA PDF + Testing Engine

$45.5  $130