ExamGecko
Home Home / ECCouncil / ICS-SCADA Cyber Security

ECCouncil ICS-SCADA Cyber Security Practice Test - Questions Answers, Page 4

Question list
Search
Search

Which component of the IT Security Model is attacked with interruption?

A.
Confidentiality
A.
Confidentiality
Answers
B.
Availability
B.
Availability
Answers
C.
Authentication
C.
Authentication
Answers
D.
Integrity
D.
Integrity
Answers
Suggested answer: B

Explanation:

The IT Security Model commonly refers to the CIA Triad, which stands for Confidentiality, Integrity, and Availability.

An attack on 'Availability' is aimed at disrupting the normal functioning and access to data or resources in a network. This type of attack can include actions such as DDoS (Distributed Denial of Service), where overwhelming traffic is sent to a system to make it unresponsive.

The main goal of attacks on availability is to prevent legitimate users from accessing systems or information, which can have significant implications for business operations and security.

Reference

Understanding the CIA Triad in Cybersecurity: https://www.cyber.gov.au/acsc/view-all-content/publications/cia-triad

Denial of Service -- What it is and how to prevent it: https://www.us-cert.gov/ncas/tips/ST04-015

In what default directory (fully qualified path) does nmap store scripts?

A.
/usr/share/scripts
A.
/usr/share/scripts
Answers
B.
/ust/share/nmap/scripts
B.
/ust/share/nmap/scripts
Answers
C.
/usr/share/nmap
C.
/usr/share/nmap
Answers
D.
/opt
D.
/opt
Answers
Suggested answer: C

Explanation:

Nmap (Network Mapper) is a network scanning and security auditing tool. Scripts used by Nmap for performing different network discovery and security auditing tasks are stored in /usr/share/nmap/scripts. This directory contains a collection of scripts for NSE (Nmap Scripting Engine), which enables Nmap to perform additional networking tasks, often used for detecting vulnerabilities, misconfigurations, and security-related information about network services.

Reference:

Nmap documentation, 'Nmap Scripting Engine (NSE)'.

Which of the registrars contains the information for the domain owners in South America?

A.
AFRINIC
A.
AFRINIC
Answers
B.
ARIN
B.
ARIN
Answers
C.
LACNIC
C.
LACNIC
Answers
D.
RIPENCC
D.
RIPENCC
Answers
Suggested answer: C

Explanation:

LACNIC (Latin American and Caribbean Network Information Centre) is the regional Internet registry for Latin America and parts of the Caribbean. It manages the allocation and registration of Internet number resources (such as IP addresses and AS numbers) within this region and maintains the registry of domain owners in South America.

Reference:

LACNIC official website, 'About LACNIC'.

Which of the hacking methodology steps can be used to identify the applications and vendors used?

A.
Enumeration
A.
Enumeration
Answers
B.
OSINT
B.
OSINT
Answers
C.
Scanning
C.
Scanning
Answers
D.
Surveillance
D.
Surveillance
Answers
Suggested answer: B

Explanation:

OSINT (Open Source Intelligence) refers to the collection and analysis of information gathered from public, freely available sources to be used in an intelligence context. In the context of hacking methodologies, OSINT can be used to identify applications and vendors employed by a target organization by analyzing publicly available data such as websites, code repositories, social media, and other internet-facing resources.

Reference:

Michael Bazzell, 'Open Source Intelligence Techniques'.

Which of the following is a component of an IDS?

A.
All of these
A.
All of these
Answers
B.
Respond
B.
Respond
Answers
C.
Detect
C.
Detect
Answers
D.
Monitor
D.
Monitor
Answers
Suggested answer: A

Explanation:

An Intrusion Detection System (IDS) is designed to monitor network or system activities for malicious activities or policy violations and can perform several functions:

Monitor: Observing network traffic and system activities for unusual or suspicious behavior.

Detect: Identifying potential security breaches including both known threats and unusual activities that could indicate new threats.

Respond: Executing pre-defined actions to address detected threats, which can include alerts or triggering automatic countermeasures.

Reference:

Cisco Systems, 'Intrusion Detection Systems'.

Which of the IEC 62443 Security Levels is identified by a cybercrime/hacker target?

A.
4
A.
4
Answers
B.
3
B.
3
Answers
C.
1
C.
1
Answers
D.
2
D.
2
Answers
Suggested answer: B

Explanation:

IEC 62443 is an international series of standards on Industrial communication networks and system security, specifically related to Industrial Automation and Control Systems (IACS). Within the IEC 62443 standards, Security Level 3 is defined as protection against deliberate or specialized intrusion. It is designed to safeguard against threats from skilled attackers (cybercriminals or hackers) targeting specific processes or operations within the industrial control system.

Reference:

International Electrotechnical Commission, 'IEC 62443 Standards'.

Which of the following was attacked using the Stuxnet malware?

A.
PLCS
A.
PLCS
Answers
B.
PLC3
B.
PLC3
Answers
C.
All of these
C.
All of these
Answers
D.
PLC7
D.
PLC7
Answers
Suggested answer: A

Explanation:

Stuxnet is a highly sophisticated piece of malware discovered in 2010 that specifically targeted Supervisory Control and Data Acquisition (SCADA) systems used to control and monitor industrial processes.

The primary targets of Stuxnet were Programmable Logic Controllers (PLCs), which are critical components in industrial control systems.

Stuxnet was designed to infect Siemens Step7 software PLCs. It altered the operation of the PLCs to cause physical damage to the connected hardware, famously used against Iran's uranium enrichment facility, where it caused the fast-spinning centrifuges to tear themselves apart.

Reference

Langner, R. 'Stuxnet: Dissecting a Cyberwarfare Weapon.' IEEE Security & Privacy, May-June 2011.

'W32.Stuxnet Dossier,' Symantec Corporation, Version 1.4, February 2011.

What is the size in bytes of the TCP sequence number in the header?

A.
2
A.
2
Answers
B.
1
B.
1
Answers
C.
3
C.
3
Answers
D.
4
D.
4
Answers
Suggested answer: D

Explanation:

In the Transmission Control Protocol (TCP) header, the sequence number field is crucial for ensuring the correct sequencing of the packets sent over a network.

The sequence number field in the TCP header is 32 bits long, which equates to 4 bytes.

This sequence number is used to keep track of the bytes in a sequence that are transferred over a TCP connection, ensuring that packets are arranged in the correct order and data integrity is maintained during transmission.

Reference

Postel, J., 'Transmission Control Protocol,' RFC 793, September 1981.

'TCP/IP Guide,' Kozierok, C. M., 2005.

Which component of the IT Security Model is attacked with modification?

A.
Authentication
A.
Authentication
Answers
B.
Availability
B.
Availability
Answers
C.
Integrity
C.
Integrity
Answers
D.
Confidentiality
D.
Confidentiality
Answers
Suggested answer: C

Explanation:

Modification attacks directly impact the integrity of data within the IT Security Model. Integrity ensures that information is accurate and unchanged from its original form unless altered by authorized means. An attack that involves modification manipulates data in unauthorized ways, thereby compromising its accuracy and reliability.

Reference:

Shon Harris, 'CISSP Certification: All-in-One Exam Guide'.

Which of the following is required to determine the correct Security Association?

A.
SPI
A.
SPI
Answers
B.
Partner IP address
B.
Partner IP address
Answers
C.
Protocol
C.
Protocol
Answers
D.
All of these
D.
All of these
Answers
Suggested answer: D

Explanation:

To determine the correct Security Association (SA) in the context of IPsec, several elements are required:

SPI (Security Parameter Index): Uniquely identifies the SA.

Partner IP address: The address of the endpoint with which the SA is established.

Protocol: Specifies the type of security protocol used (e.g., AH or ESP). All these components collectively define and identify a specific SA for secure communication between parties.

Reference:

RFC 4301, 'Security Architecture for the Internet Protocol'.

Total 75 questions
Go to page: of 8