ExamGecko
Home / ECCouncil / ICS-SCADA Cyber Security / List of questions
Ask Question

ECCouncil ICS-SCADA Cyber Security Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

A Security Association is a __________ way connection?

One
One
None of these
None of these
Two
Two
Three
Three
Suggested answer: A
Explanation:

A Security Association (SA) in the context of IPsec is a one-way logical connection used for secure communication between two endpoints. IPsec requires two SAs to establish a secure, bidirectional communication channel---one for each direction (inbound and outbound). This arrangement ensures that each direction is independently secured, with its own set of security parameters.

Reference:

RFC 4301, 'Security Architecture for the Internet Protocol'.

asked 18/09/2024
Adam Bednar
44 questions

Question 12

Report Export Collapse

Which publication from NIST provides guidance on Industrial Control Systems?

NIST SP 800-90
NIST SP 800-90
NIST SP 800-82
NIST SP 800-82
NIST SP 800-77
NIST SP 800-77
NIST SP 800-44
NIST SP 800-44
Suggested answer: B
Explanation:

NIST Special Publication 800-82, 'Guide to Industrial Control Systems (ICS) Security,' provides guidance on securing industrial control systems, including SCADA systems, distributed control systems (DCS), and other control system configurations such as programmable logic controllers (PLC). It offers practices and recommendations for protecting and securing ICS systems against disruptions, malicious activities, and other threats to their integrity and availability.

Reference:

National Institute of Standards and Technology (NIST), 'Guide to Industrial Control Systems (ICS) Security'.

asked 18/09/2024
mr yosh
42 questions

Question 13

Report Export Collapse

Which mode within IPsec provides a secure connection tunnel between two endpoints AND protects the sender and the receiver?

Protected
Protected
Tunnel
Tunnel
Transport
Transport
Covered
Covered
Suggested answer: B
Explanation:

IPsec (Internet Protocol Security) has two modes: Transport mode and Tunnel mode.

Tunnel mode is used to create a secure connection tunnel between two endpoints (e.g., two gateways, or a client and a gateway) and it encapsulates the entire IP packet.

This mode not only protects the payload but also the header information of the original IP packet, thereby providing a higher level of security compared to Transport mode, which only protects the payload.

Reference

Kent, S. and Seo, K., 'Security Architecture for the Internet Protocol,' RFC 4301, December 2005.

'IPsec Services,' Microsoft TechNet.

asked 18/09/2024
Arun Lailamony
46 questions

Question 14

Report Export Collapse

Which of the following can be used to view entire copies of web sites?

Wayback machine
Wayback machine
Google Cache
Google Cache
Netcraft
Netcraft
Bing offline
Bing offline
Suggested answer: A
Explanation:

The Wayback Machine is an internet service provided by the Internet Archive that allows users to see archived versions of web pages across time, enabling them to browse past versions of a website as it appeared on specific dates.

It captures and stores snapshots of web pages, making it an invaluable tool for accessing the historical state of a website or recovering content that has since been changed or deleted.

Other options like Google Cache may also show snapshots of web pages, but the Wayback Machine is dedicated to this purpose and holds a vast archive of historical web data.

Reference

Internet Archive: https://archive.org

'Using the Wayback Machine,' Internet Archive Help Center.

asked 18/09/2024
Tresor Garcia
45 questions

Question 15

Report Export Collapse

The NIST SP 800-53 defines how many management controls?

Become a Premium Member for full access
  Unlock Premium Member

Question 16

Report Export Collapse

Which component of the IT Security Model is attacked with masquerade?

Become a Premium Member for full access
  Unlock Premium Member

Question 17

Report Export Collapse

What is a vulnerability called that is released before a patch comes out?

Become a Premium Member for full access
  Unlock Premium Member

Question 18

Report Export Collapse

Which of the following are required functions of information management?

Become a Premium Member for full access
  Unlock Premium Member

Question 19

Report Export Collapse

What type of protocol is considered connection-oriented?

Become a Premium Member for full access
  Unlock Premium Member

Question 20

Report Export Collapse

Which of the following steps is used to reveal the IP addressing?

Become a Premium Member for full access
  Unlock Premium Member
Total 75 questions
Go to page: of 8