ECCouncil ICS-SCADA Cyber Security Practice Test - Questions Answers, Page 5
List of questions
Related questions
What share does the WannaCry ransomware use to connect with the target?
A.
$IPC
B.
$Admin
C.
$SPOOL
D.
$C
Which of the following is considered the best way to counter packet monitoring for a switch?
A.
Tap
B.
Duplication
C.
SPAN
D.
Port mirror
Which of the following is a weakness of a vulnerability scanner?
A.
Detect known vulnerabilities
B.
Not designed to go through filters
C.
Work best on a local network
D.
Maintains a signature database
What version of SMB did the WannaCry ransomware attack?
A.
All of these
B.
2
C.
1
D.
3
With respect to the IEC 62443, how many steps are in the Defense in Depth process?
A.
8
B.
4
C.
6
D.
2
What is the default size in bits of the Windows Echo Request packet?
A.
28
B.
24
C.
58
D.
32
Which mode within IPsec provides secure connection between two endpoints but does NOT protect the sender and the receiver?
A.
Tunnel
B.
Covered
C.
Transport
D.
Protected
Which of the monitor alerts is considered most dangerous?
A.
True Positive
B.
False Positive
C.
False Negative
D.
True Negative
Which of the following is known as a prebuilt directional gateway that is unidirectional?
A.
Firewall
B.
Data Diode
C.
None of these
D.
Unigate
Question