ECCouncil ICS-SCADA Cyber Security Practice Test - Questions Answers, Page 6
List of questions
Related questions
Which component of the IT Security Model is attacked with eavesdropping and interception?
A.
Confidentiality
B.
Availability
C.
Integrity
D.
Authentication
How many firewalls are there in the most common ICS/SCADA architecture?
A.
3
B.
1
C.
None of these
D.
2
Which of the following is the stance on risk that by default allows traffic with a default permit approach?
A.
Paranoid
B.
Prudent
C.
Promiscuous
D.
Permissive
Which of the IPsec headers contains the Security Parameters Index (SPI)?
A.
AH
B.
Both AH and ESP
C.
ESP
D.
ICV
Which of the TCP flags represents data in the packet?
A.
RST
B.
ACK
C.
PSH
D.
FIN
Which of the following is NOT ICS specific malware?
A.
Flame
B.
Ha vex
C.
Code Red
D.
Stuxnet
A protocol analyzer that produces raw output is which of the following?
A.
tcpdump
B.
Wireshark
C.
Capsa
D.
Commview
With respect to data analysis, which of the following is not a step?
A.
Enumeration
B.
All of these
C.
vulnerabilities
D.
Scanning for targets
Question