ExamGecko
Home / ECCouncil / ICS-SCADA Cyber Security / List of questions
Ask Question

ECCouncil ICS-SCADA Cyber Security Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

Which component of the IT Security Model is attacked with interruption?

Become a Premium Member for full access
  Unlock Premium Member

Question 32

Report Export Collapse

In what default directory (fully qualified path) does nmap store scripts?

Become a Premium Member for full access
  Unlock Premium Member

Question 33

Report Export Collapse

Which of the registrars contains the information for the domain owners in South America?

Become a Premium Member for full access
  Unlock Premium Member

Question 34

Report Export Collapse

Which of the hacking methodology steps can be used to identify the applications and vendors used?

Become a Premium Member for full access
  Unlock Premium Member

Question 35

Report Export Collapse

Which of the following is a component of an IDS?

Become a Premium Member for full access
  Unlock Premium Member

Question 36

Report Export Collapse

Which of the IEC 62443 Security Levels is identified by a cybercrime/hacker target?

Become a Premium Member for full access
  Unlock Premium Member

Question 37

Report Export Collapse

Which of the following was attacked using the Stuxnet malware?

Become a Premium Member for full access
  Unlock Premium Member

Question 38

Report Export Collapse

What is the size in bytes of the TCP sequence number in the header?

Become a Premium Member for full access
  Unlock Premium Member

Question 39

Report Export Collapse

Which component of the IT Security Model is attacked with modification?

Become a Premium Member for full access
  Unlock Premium Member

Question 40

Report Export Collapse

Which of the following is required to determine the correct Security Association?

Become a Premium Member for full access
  Unlock Premium Member
Total 75 questions
Go to page: of 8