Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

ICS-SCADA Sample Questions Answers

Questions 4

Which of the IEC 62443 security levels is identified by a hacktivist/terrorist target?

Options:

A.

1

B.

3

C.

4

D.

2

Buy Now
Questions 5

What version of SMB did the WannaCry ransomware attack?

Options:

A.

All of these

B.

2

C.

1

D.

3

Buy Now
Questions 6

At what layer does a switch normally operate?

Options:

A.

4

B.

7

C.

2

D.

3

Buy Now
Questions 7

Which of the ICS/SCADA generations is considered distributed?

Options:

A.

Fourth

B.

Second

C.

Third

D.

First

Buy Now
Questions 8

Which of the registrars contains the information for the domain owners in Europe?

Options:

A.

RIPENCC

B.

AFRINIC

C.

LACNIC

D.

ARIN

Buy Now
Questions 9

Which of the ICS/SCADA generations is considered monolithic?

Options:

A.

Second

B.

First

C.

Fourth

D.

Third

Buy Now
Questions 10

Which component of the IT Security Model is the highest priority in ICS/SCADA Security?

Options:

A.

Integrity

B.

Authentication

C.

Availability

D.

Confidentiality

Buy Now
Questions 11

Who developed the ModBus protocol?

Options:

A.

Siemens

B.

BAG

C.

Modicon

D.

Motorola

Buy Now
Questions 12

Which of the following are required functions of information management?

Options:

A.

All of these

B.

Date enrichment

C.

Normalization

D.

Correlation

Buy Now
Questions 13

Which of the ICS/SCADA generations is considered networked?

Options:

A.

Fourth

B.

Third

C.

Second

D.

First

Buy Now
Questions 14

What form of attack uses a vector that infects a software package?

Options:

A.

Spam

B.

All of these

C.

Quicksand

D.

Watering Hole

Buy Now
Questions 15

What is the extension of nmap scripts?

Options:

A.

.nsn

B.

.nse

C.

.nsv

D.

.ns

Buy Now
Questions 16

In what default directory (fully qualified path) does nmap store scripts?

Options:

A.

/usr/share/scripts

B.

/ust/share/nmap/scripts

C.

/usr/share/nmap

D.

/opt

Buy Now
Questions 17

Which component of the IT Security Model is attacked with eavesdropping and interception?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Authentication

Buy Now
Questions 18

Which of the registrars contains the information for the domain owners in South America?

Options:

A.

AFRINIC

B.

ARIN

C.

LACNIC

D.

RIPENCC

Buy Now
Questions 19

A protocol analyzer that produces raw output is which of the following?

Options:

A.

tcpdump

B.

Wireshark

C.

Capsa

D.

Commview

Buy Now
Questions 20

Which component of the IT Security Model is attacked with modification?

Options:

A.

Authentication

B.

Availability

C.

Integrity

D.

Confidentiality

Buy Now
Questions 21

When monitoring a network, you receive an ICMP type 8 packet. What does this represent?

Options:

A.

Echo request

B.

Echo start

C.

Echo recall

D.

Echo reply

Buy Now
Questions 22

Which of the options in the netstat command show the routing table?

Options:

A.

c

B.

a

C.

r

D.

s

Buy Now
Exam Code: ICS-SCADA
Exam Name: ICS/SCADA Cyber Security Exam
Last Update: Nov 26, 2024
Questions: 75
$66  $164.99
$50  $124.99
$42  $104.99
buy now ICS-SCADA