ExamGecko
Home / ECCouncil / ICS-SCADA Cyber Security / List of questions
Ask Question

ECCouncil ICS-SCADA Cyber Security Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

What share does the WannaCry ransomware use to connect with the target?

Become a Premium Member for full access
  Unlock Premium Member

Question 42

Report Export Collapse

Which of the following is considered the best way to counter packet monitoring for a switch?

Become a Premium Member for full access
  Unlock Premium Member

Question 43

Report Export Collapse

Which of the following is a weakness of a vulnerability scanner?

Become a Premium Member for full access
  Unlock Premium Member

Question 44

Report Export Collapse

What version of SMB did the WannaCry ransomware attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 45

Report Export Collapse

With respect to the IEC 62443, how many steps are in the Defense in Depth process?

Become a Premium Member for full access
  Unlock Premium Member

Question 46

Report Export Collapse

What is the default size in bits of the Windows Echo Request packet?

Become a Premium Member for full access
  Unlock Premium Member

Question 47

Report Export Collapse

Which mode within IPsec provides secure connection between two endpoints but does NOT protect the sender and the receiver?

Become a Premium Member for full access
  Unlock Premium Member

Question 48

Report Export Collapse

Which of the monitor alerts is considered most dangerous?

Become a Premium Member for full access
  Unlock Premium Member

Question 49

Report Export Collapse

Which of the following is known as a prebuilt directional gateway that is unidirectional?

Become a Premium Member for full access
  Unlock Premium Member

Question 50

Report Export Collapse

At what layer does a switch normally operate?

Become a Premium Member for full access
  Unlock Premium Member
Total 75 questions
Go to page: of 8