ECCouncil ICS-SCADA Cyber Security Practice Test - Questions Answers, Page 5

List of questions
Question 41

What share does the WannaCry ransomware use to connect with the target?
Question 42

Which of the following is considered the best way to counter packet monitoring for a switch?
Question 43

Which of the following is a weakness of a vulnerability scanner?
Question 44

What version of SMB did the WannaCry ransomware attack?
Question 45

With respect to the IEC 62443, how many steps are in the Defense in Depth process?
Question 46

What is the default size in bits of the Windows Echo Request packet?
Question 47

Which mode within IPsec provides secure connection between two endpoints but does NOT protect the sender and the receiver?
Question 48

Which of the monitor alerts is considered most dangerous?
Question 49

Which of the following is known as a prebuilt directional gateway that is unidirectional?
Question 50

At what layer does a switch normally operate?
Question