ExamGecko
Home Home / ECCouncil / ICS-SCADA Cyber Security

ECCouncil ICS-SCADA Cyber Security Practice Test - Questions Answers, Page 7

Question list
Search
Search

What does the SPI within IPsec identify?

A.
Security Association
A.
Security Association
Answers
B.
Key Exchange
B.
Key Exchange
Answers
C.
Decryption algorithm
C.
Decryption algorithm
Answers
D.
All of these
D.
All of these
Answers
Suggested answer: A

Explanation:

Within IPsec, the SPI (Security Parameter Index) is a critical component that uniquely identifies a Security Association (SA) for the IPsec session. The SPI is used in the IPsec headers to help the receiving party determine which SA has been agreed upon for processing the incoming packets. This identification is crucial for the proper operation and management of security policies applied to the encrypted data flows.

Reference:

RFC 4301, 'Security Architecture for the Internet Protocol,' which discusses the structure and use of the SPI in IPsec communications.

What type of protocol is represented by the number 6?

A.
IUDP
A.
IUDP
Answers
B.
IGRP
B.
IGRP
Answers
C.
ICMP
C.
ICMP
Answers
D.
TCP
D.
TCP
Answers
Suggested answer: D

Explanation:

The protocol number 6 represents TCP (Transmission Control Protocol) in the Internet Protocol suite. TCP is a core protocol of the Internet Protocol suite and operates at the transport layer, providing reliable, ordered, and error-checked delivery of a stream of bytes between applications running on hosts communicating via an IP network.

Reference:

RFC 793, 'Transmission Control Protocol,' which specifies the detailed operation of TCP.

Which of the following are NOT components of an ICS/SCADA network device?

A.
Low processing threshold
A.
Low processing threshold
Answers
B.
Legacy systems
B.
Legacy systems
Answers
C.
High bandwidth networks
C.
High bandwidth networks
Answers
D.
Weak network stack
D.
Weak network stack
Answers
Suggested answer: C

Explanation:

Industrial Control Systems (ICS) and SCADA networks typically operate in environments where the available bandwidth is limited. They are often characterized by:

Low processing threshold: ICS/SCADA devices generally have limited processing capabilities due to their specialized and often legacy nature.

Legacy systems: Many ICS/SCADA systems include older technology that might not support newer security protocols or high-speed data transfer.

Weak network stack: These systems may have incomplete or less robust network stacks that can be susceptible to specific types of network attacks.

High bandwidth networks are not typical of ICS/SCADA environments, as these systems do not usually require or support high-speed data transmission due to their operational requirements and the older technology often used in such environments.

Reference

'Navigating the Challenges of Industrial Control Systems,' by ISA-99 Industrial Automation and Control Systems Security.

'Cybersecurity for Industrial Control Systems,' by the Department of Homeland Security.

Which of the CVSS metrics refer to the exploit quotient of the vulnerability?

A.
Temporal
A.
Temporal
Answers
B.
Environmental
B.
Environmental
Answers
C.
IBase
C.
IBase
Answers
D.
All of these
D.
All of these
Answers
Suggested answer: A

Explanation:

The Common Vulnerability Scoring System (CVSS) uses several metrics to assess the severity of vulnerabilities. Among them, the Temporal metric group specifically reflects the exploit quotient of a vulnerability.

Temporal metrics consider factors that change over time after a vulnerability is initially assessed. These include:

Exploit Code Maturity: This assesses the likelihood of the vulnerability being exploited based on the availability and maturity of exploit code.

Remediation Level: The level of remediation available for the vulnerability, which influences the ease of mitigation.

Report Confidence: This metric measures the reliability of the reports about the vulnerability.

These temporal factors directly affect the exploitability and potential threat posed by a vulnerability, adjusting the base score to provide a more current view of the risk.

Reference

Common Vulnerability Scoring System v3.1: User Guide.

'Understanding CVSS,' by FIRST (Forum of Incident Response and Security Teams).

Which of the following ports are used for communications in Modbus TCP?

A.
205
A.
205
Answers
B.
405
B.
405
Answers
C.
505
C.
505
Answers
D.
502
D.
502
Answers
Suggested answer: D

Explanation:

Modbus TCP is a variant of the Modbus family of simple, networked protocols aimed at industrial automation applications. Unlike the original Modbus protocol, which runs over serial links, Modbus TCP runs over TCP/IP networks.

Port 502 is the standard TCP port used for Modbus TCP communications. This port is designated for Modbus messages encapsulated in a TCP/IP wrapper, facilitating communication between Modbus devices and management systems over an IP network.

Knowing the correct port number is crucial for network configuration, security settings, and troubleshooting communications within a Modbus-enabled ICS/SCADA environment.

Reference

Modbus Organization, 'MODBUS Application Protocol Specification V1.1b3'.

'Modbus TCP/IP -- A Comprehensive Network protocol,' by Schneider Electric.

Which of the following is the stance that by default has a default deny approach?

A.
Permissive
A.
Permissive
Answers
B.
Paranoid
B.
Paranoid
Answers
C.
Promiscuous
C.
Promiscuous
Answers
D.
Prudent
D.
Prudent
Answers
Suggested answer: B

Explanation:

In the context of network security policies, a 'Paranoid' stance typically means adopting a default-deny posture. This security approach is one of the most restrictive, where all access is blocked unless explicitly allowed.

A default deny strategy is considered best practice for securing highly sensitive environments, as it minimizes the risk of unauthorized access and reduces the attack surface.

This approach contrasts with more open stances such as Permissive or Promiscuous, which are less restrictive and generally allow more traffic by default.

Reference

'Network Security: Policies and Guidelines for Effective Network Management,' by Jonathan Gossels.

'Best Practices for Implementing a Security Awareness Program,' by Kaspersky Lab.

How many IPsec rules are there in Microsoft Firewall configuration?

A.
2
A.
2
Answers
B.
5
B.
5
Answers
C.
3
C.
3
Answers
D.
4
D.
4
Answers
Suggested answer: D

Explanation:

In the configuration of Microsoft Windows Firewall with Advanced Security, you can define IPsec rules as part of your security policy. Typically, these rules can be organized into four main categories: Allow connection, Block connection, Allow if secure (which can specify encryption or authentication requirements), and Custom. While the interface and features can vary slightly between Windows versions, four fundamental types of rules regarding how traffic is handled are commonly supported.

Reference:

Microsoft documentation, 'Windows Firewall with Advanced Security'.

Which component of the IT Security Model is usually the least priority in ICS/SCADA Security?

A.
Integrity
A.
Integrity
Answers
B.
Confidentiality
B.
Confidentiality
Answers
C.
Availability
C.
Availability
Answers
D.
Authentication
D.
Authentication
Answers
Suggested answer: B

Explanation:

In ICS/SCADA systems, the typical priority hierarchy of the IT Security Model components places Availability and Integrity above Confidentiality. This prioritization is due to the critical nature of operational continuity and data accuracy in industrial control systems, where system downtime or incorrect data can lead to significant operational disruptions or safety issues. Confidentiality, while important, is often considered of lesser priority compared to ensuring systems are operational (Availability) and data is accurate (Integrity).

Reference:

National Institute of Standards and Technology (NIST), 'Guide to Industrial Control Systems (ICS) Security'.

What is used in the Modbus protocol to tell the slave to read or write?

A.
None of these
A.
None of these
Answers
B.
Function code
B.
Function code
Answers
C.
Unit ID
C.
Unit ID
Answers
D.
Slave command
D.
Slave command
Answers
Suggested answer: B

Explanation:

In the Modbus protocol, the function code is used to tell the slave device what kind of action to perform, such as reading or writing data.

Modbus function codes specify the type of operation to be performed on the registers. For example, function code 03 is used to read holding registers, and function code 06 is used to write a single register.

Each function code is a single byte in size and is positioned at the start of the PDU (Protocol Data Unit) in the Modbus message structure, directly influencing how the slave interprets and executes the request.

Reference

'Modbus Application Protocol Specification V1.1b,' Modbus Organization.

'The Modbus Protocol Explained,' by Schneider Electric.

Which component of the IT Security Model is the highest priority in ICS/SCADA Security?

A.
Integrity
A.
Integrity
Answers
B.
Authentication
B.
Authentication
Answers
C.
Availability
C.
Availability
Answers
D.
Confidentiality
D.
Confidentiality
Answers
Suggested answer: C

Explanation:

In ICS/SCADA systems, the highest priority typically is Availability, due to the critical nature of the services and infrastructures they support. These systems often control vital processes in industries like energy, water treatment, and manufacturing. Any downtime can lead to significant disruptions, safety hazards, or economic losses. Thus, ensuring that systems are operational and accessible is a primary security focus in the context of ICS/SCADA security.

Reference:

National Institute of Standards and Technology (NIST), 'Guide to Industrial Control Systems (ICS) Security'.

Total 75 questions
Go to page: of 8