Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

ICS-SCADA Questions and Answers

Question # 6

What is the maximum size in bytes of an ethernet packet?

A.

1200

B.

1400

C.

1500

D.

1300

Full Access
Question # 7

Which of the following is required to determine the correct Security Association?

A.

SPI

B.

Partner IP address

C.

Protocol

D.

All of these

Full Access
Question # 8

What form of attack uses a vector that infects a software package?

A.

Spam

B.

All of these

C.

Quicksand

D.

Watering Hole

Full Access
Question # 9

What type of protocol is considered connection-oriented?

A.

UDP

B.

TCP

C.

ICMP

D.

ARP

Full Access
Question # 10

Which of the following names represents inbound filtering?

A.

Funnel

B.

Sanity

C.

Egress

D.

Ingress

Full Access
Question # 11

At what layer does a switch normally operate?

A.

4

B.

7

C.

2

D.

3

Full Access
Question # 12

Which of the following ports are used for communications in Modbus TCP?

A.

205

B.

405

C.

505

D.

502

Full Access
Question # 13

Which of the following is known as a prebuilt directional gateway that is unidirectional?

A.

Firewall

B.

Data Diode

C.

None of these

D.

Unigate

Full Access
Question # 14

When monitoring a network, you receive an ICMP type 8 packet. What does this represent?

A.

Echo request

B.

Echo start

C.

Echo recall

D.

Echo reply

Full Access
Question # 15

Which component of the IT Security Model is usually the least priority in ICS/SCADA Security?

A.

Integrity

B.

Confidentiality

C.

Availability

D.

Authentication

Full Access
Question # 16

Who developed the ModBus protocol?

A.

Siemens

B.

BAG

C.

Modicon

D.

Motorola

Full Access
Question # 17

Which component of the IT Security Model is attacked with eavesdropping and interception?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Authentication

Full Access
Question # 18

Which of the monitor alerts is considered most dangerous?

A.

True Positive

B.

False Positive

C.

False Negative

D.

True Negative

Full Access
Question # 19

What step of the malware infection installs the malware on the target?

A.

Drive-by

B.

Init

C.

Dropper

D.

Stager

Full Access
Question # 20

Which of the TCP flags represents data in the packet?

A.

RST

B.

ACK

C.

PSH

D.

FIN

Full Access
Question # 21

Which of the registrars contains the information for the domain owners in South America?

A.

AFRINIC

B.

ARIN

C.

LACNIC

D.

RIPENCC

Full Access
Question # 22

Which of the following are NOT components of an ICS/SCADA network device?

A.

Low processing threshold

B.

Legacy systems

C.

High bandwidth networks

D.

Weak network stack

Full Access