ExamGecko
Home Home / ECCouncil / ICS-SCADA Cyber Security

ECCouncil ICS-SCADA Cyber Security Practice Test - Questions Answers

Question list
Search
Search

Which of the following names represents inbound filtering?

A.
Funnel
A.
Funnel
Answers
B.
Sanity
B.
Sanity
Answers
C.
Egress
C.
Egress
Answers
D.
Ingress
D.
Ingress
Answers
Suggested answer: D

Explanation:

Ingress filtering is a method used in network security to ensure that incoming packets are allowed or blocked based on a set of security rules.

This type of filtering is often implemented at the boundaries of networks to prevent unwanted or harmful traffic from entering a more secure internal network.

The term 'ingress' refers to traffic that is entering a network boundary, whereas 'egress' refers to traffic exiting a network.

Reference

Cisco Networking Academy Program: Network Security.

'Understanding Ingress and Egress Filtering,' Network Security Guidelines, TechNet.

Which of the IEC 62443 security levels is identified by a hacktivist/terrorist target?

A.
1
A.
1
Answers
B.
3
B.
3
Answers
C.
4
C.
4
Answers
D.
2
D.
2
Answers
Suggested answer: C

Explanation:

IEC 62443 defines multiple security levels (SLs) tailored to address different types of threats and attackers in industrial control systems.

Security Level 4 (SL4) is designed to protect against sophisticated attacks by adversaries such as hacktivists or terrorists. SL4 involves threats that are targeted with specific intent against the organization, using advanced skills and means.

This level assumes that the adversary is capable of sustained and focused efforts with significant resources, including state-level actors or well-funded groups, aiming at causing widespread disruption or damage.

Reference

IEC 62443-3-3: System security requirements and security levels.

'Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems,' by Eric Knapp.

What is the maximum size in bytes of an ethernet packet?

A.
1200
A.
1200
Answers
B.
1400
B.
1400
Answers
C.
1500
C.
1500
Answers
D.
1300
D.
1300
Answers
Suggested answer: C

Explanation:

The maximum transmission unit (MTU) for Ethernet, which is the largest size of an Ethernet packet or frame that can be sent over the network, is typically 1500 bytes. This size does not include the Ethernet frame's preamble and start frame delimiter but does include all other headers and the payload. Ethernet's MTU of 1500 bytes is a standard for most Ethernet networks, especially those conforming to the IEEE 802.3 standard.

Reference:

IEEE 802.3-2012, 'Standard for Ethernet'.

In physical to logical asset protections, what threat can be directed against the network?

A.
Elevation of privileges
A.
Elevation of privileges
Answers
B.
Flood the switch
B.
Flood the switch
Answers
C.
All of these
C.
All of these
Answers
D.
Crack the password
D.
Crack the password
Answers
Suggested answer: C

Explanation:

In the context of physical to logical asset protection in network security, several threats can be directed against the network, including:

Elevation of Privileges: Where unauthorized users gain higher-level permissions improperly.

Flood the Switch: Typically involves a DoS attack where the switch is overwhelmed with traffic, preventing normal operations.

Crack the Password: An attack aimed at gaining unauthorized access by breaking through password security. All these threats can potentially compromise the network's security and the safety of its physical and logical assets.

Reference:

CompTIA Security+ Guide to Network Security Fundamentals.


A Virtual Private Network (VPN) requires how many Security Associations?

A.
5
A.
5
Answers
B.
4
B.
4
Answers
C.
3
C.
3
Answers
D.
2
D.
2
Answers
Suggested answer: D

Explanation:

A Virtual Private Network (VPN) typically requires two Security Associations (SAs) for a secure communication session. One SA is used for inbound traffic, and the other for outbound traffic.

In the context of IPsec, which is often used to secure VPN connections, these two SAs facilitate the bidirectional secure exchange of packets in a VPN tunnel.

Each SA uniquely defines how traffic should be securely processed, including the encryption and authentication mechanisms. This ensures that data sent in one direction is handled independently from data sent in the opposite direction, maintaining the integrity and confidentiality of both communication streams.

Reference

'Understanding IPSec VPNs,' by Cisco Systems.

'IPsec Security Associations,' RFC 4301, Security Architecture for the Internet Protocol.

Which of the ICS/SCADA generations is considered distributed?

A.
Fourth
A.
Fourth
Answers
B.
Second
B.
Second
Answers
C.
Third
C.
Third
Answers
D.
First
D.
First
Answers
E.
Knapp, J. Langill, 'Industrial Network Security,' Syngress, 2014.
E.
Knapp, J. Langill, 'Industrial Network Security,' Syngress, 2014.
Answers
Suggested answer: C

Explanation:

The third generation of ICS/SCADA systems is considered distributed. This generation features systems that are networked and interconnected, typically using a variety of standard communication protocols. This distribution allows for broader connectivity and integration with other systems, enhancing operational flexibility and efficiency but also introducing more vectors for potential cyber threats.

Reference:

Joseph Weiss, 'Protecting Industrial Control Systems from Electronic Threats'.

The third generation of ICS/SCADA systems is considered distributed. These systems emerged in the late 1990s and early 2000s and were designed to overcome the limitations of earlier generations by leveraging networked architectures.

Distributed Architecture: Third-generation systems distributed control functions across multiple interconnected devices and systems, providing greater scalability and flexibility.

Network Integration: These systems integrated more extensively with IT networks, allowing for remote monitoring and control.

Standard Protocols: Adoption of standard communication protocols (e.g., Ethernet, TCP/IP) facilitated interoperability and integration with other systems.

Enhanced Redundancy: Improved fault tolerance and redundancy were implemented to ensure system reliability.

Due to these features, the third generation is known as the distributed generation.

Reference

'SCADA Systems,' SCADAHacker, SCADA Generations.

What is the size of the AH in bits with respect to width?

A.
24
A.
24
Answers
B.
43
B.
43
Answers
C.
16
C.
16
Answers
D.
32
D.
32
Answers
Suggested answer: D

Explanation:

The Authentication Header (AH) in the context of IPsec has a fixed header portion of 24 bits and a mutable part that can vary, but when considering the fixed structure of the AH itself, the width is typically considered to be 32 bits at its core structure for basic operations in providing integrity and authentication, without confidentiality.

Reference:

RFC 4302, 'IP Authentication Header'.

Which of the registrars contains the information for the domain owners in Latin America?

A.
AFRINIC
A.
AFRINIC
Answers
B.
LACNIC
B.
LACNIC
Answers
C.
RIPENCC
C.
RIPENCC
Answers
D.
ARIN
D.
ARIN
Answers
Suggested answer: B

Explanation:

LACNIC, the Latin American and Caribbean Internet Addresses Registry, is the regional internet registry (RIR) responsible for allocating and administering IP addresses and Autonomous System Numbers (ASNs) in Latin America and the Caribbean.

Function: LACNIC manages the distribution of internet number resources (IP addresses and ASNs) in its region, maintaining the registry of domain owners and other related information.

Coverage: The organization covers over 30 countries in Latin America and the Caribbean, including countries like Brazil, Argentina, Chile, and Mexico.

Services: LACNIC provides a range of services including IP address allocation, ASN allocation, reverse DNS, and policy development for internet resource management in its region.

Given this role, LACNIC is the correct answer for the registrar that contains information for domain owners in Latin America.

Reference

'About LACNIC,' LACNIC, LACNIC Overview.

'Regional Internet Registries,' Wikipedia, Regional Internet Registries.

Which of the following are valid TCP flags?

A.
None of these
A.
None of these
Answers
B.
IGP,ACK,SYN,PSH,URG
B.
IGP,ACK,SYN,PSH,URG
Answers
C.
BGP,FIN,PSH,SYN,ACK
C.
BGP,FIN,PSH,SYN,ACK
Answers
D.
FIN,PSH,URG,RST,SYN
D.
FIN,PSH,URG,RST,SYN
Answers
Suggested answer: D

Explanation:

TCP flags are used in the header of TCP segments to control the flow of data and to indicate the status of a connection. Valid TCP flags include:

FIN: Finish, used to terminate the connection.

PSH: Push, instructs the receiver to pass the data to the application immediately.

URG: Urgent, indicates that the data contained in the segment should be processed urgently.

RST: Reset, abruptly terminates the connection upon error or other conditions.

SYN: Synchronize, used during the initial handshake to establish a connection. These flags are integral to managing the state and flow of TCP connections.

Reference:

Douglas E. Comer, 'Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture'.

Which of the options in the netstat command show the routing table?

A.
c
A.
c
Answers
B.
a
B.
a
Answers
C.
r
C.
r
Answers
D.
s
D.
s
Answers
Suggested answer: C

Explanation:

The netstat command is a versatile networking tool used for various network-related information-gathering tasks, including displaying all network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.

The specific option -r with the netstat command is used to display the routing table.

This information is critical for troubleshooting network issues and understanding how data is routed through a network, identifying possible points of failure or security vulnerabilities.

Reference

'Linux Network Administrator's Guide,' by O'Reilly Media.

Man pages for netstat in UNIX/Linux distributions.

Total 75 questions
Go to page: of 8