ECCouncil ICS-SCADA Cyber Security Practice Test - Questions Answers, Page 5
List of questions
Question 41
What share does the WannaCry ransomware use to connect with the target?
Question 42
Which of the following is considered the best way to counter packet monitoring for a switch?
Question 43
Which of the following is a weakness of a vulnerability scanner?
Question 44
What version of SMB did the WannaCry ransomware attack?
Question 45
With respect to the IEC 62443, how many steps are in the Defense in Depth process?
Question 46
What is the default size in bits of the Windows Echo Request packet?
Question 47
Which mode within IPsec provides secure connection between two endpoints but does NOT protect the sender and the receiver?
Question 48
Which of the monitor alerts is considered most dangerous?
Question 49
Which of the following is known as a prebuilt directional gateway that is unidirectional?
Question 50
At what layer does a switch normally operate?
Question