ExamGecko
Home Home / ECCouncil / ICS-SCADA Cyber Security

ECCouncil ICS-SCADA Cyber Security Practice Test - Questions Answers, Page 8

Question list
Search
Search

Which of the following is the name of hacking for a cause?

A.
Lulzec
A.
Lulzec
Answers
B.
Anonymous
B.
Anonymous
Answers
C.
Hacktivism
C.
Hacktivism
Answers
D.
Suicide Hackers
D.
Suicide Hackers
Answers
Suggested answer: C

Explanation:

Hacktivism refers to the act of hacking, or breaking into computer systems, for a politically or socially motivated purpose. Hacktivists use their skills to promote a cause, influence public opinion, or bring attention to social injustices. The term combines 'hacking' and 'activism,' representing a form of activism that takes place within cyberspace.

Reference:

Dorothy E. Denning, 'Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy'.

What form of attack uses a vector that infects a software package?

A.
Spam
A.
Spam
Answers
B.
All of these
B.
All of these
Answers
C.
Quicksand
C.
Quicksand
Answers
D.
Watering Hole
D.
Watering Hole
Answers
Suggested answer: D

Explanation:

A 'watering hole' attack is a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit.

The goal is to infect a website that members of a targeted community frequently use with malware. Once a user visits the compromised website, malware can be delivered to the user's system, exploiting vulnerabilities on their device.

This attack vector is used in scenarios where attackers want to breach secure environments indirectly by targeting less secure points in a network's ecosystem, such as third-party software used within the organization.

Reference

'Watering Hole Attacks: Detect, Disrupt, and Prevent,' by Kaspersky Lab.

'Emerging Threats in Cybersecurity: Understanding Watering Hole Attacks,' published in the Journal of Network Security.

Which of the ICS/SCADA generations is considered networked?

A.
Fourth
A.
Fourth
Answers
B.
Third
B.
Third
Answers
C.
Second
C.
Second
Answers
D.
First
D.
First
Answers
Suggested answer: B

Explanation:

Industrial Control Systems (ICS) have evolved through several generations, each characterized by different technological capabilities and integration levels.

The third generation of ICS/SCADA systems is considered networked. This generation incorporates more advanced digital and networking technologies, allowing for broader connectivity and communication across different systems and components within industrial environments.

Third-generation SCADA systems are often characterized by their use of standard communication protocols and networked solutions, improving interoperability and control but also increasing the attack surface for potential cyber threats.

Reference

'Evolution of Industrial Control Systems and Cybersecurity Implications,' IEEE Transactions on Industry Applications.

'Network Security for Industrial Control Systems,' by Department of Homeland Security.

Who developed the ModBus protocol?

A.
Siemens
A.
Siemens
Answers
B.
BAG
B.
BAG
Answers
C.
Modicon
C.
Modicon
Answers
D.
Motorola
D.
Motorola
Answers
Suggested answer: C

Explanation:

The Modbus protocol was developed by Modicon, now a brand of Schneider Electric.

It was originally designed in 1979 for use with its programmable logic controllers (PLCs) in industrial applications.

Modbus is a serial communications protocol that has become a de facto standard communication protocol and is now commonly used to connect industrial electronic devices. The main reasons for its use are its simplicity and the fact that it is open-source, which allows manufacturers to build their own implementations of the standard.

Reference

'Modbus Protocol Reference Guide,' Modicon, Inc., 1979.

'A Guide to the Modbus Protocol,' Schneider Electric.

Which type of Intrusion Prevention System can monitor and validate encrypted data?

A.
Memory
A.
Memory
Answers
B.
Network
B.
Network
Answers
C.
Host
C.
Host
Answers
D.
Anomaly
D.
Anomaly
Answers
Suggested answer: B

Explanation:

A Network Intrusion Prevention System (NIPS) is capable of monitoring and validating encrypted data if it is integrated with technologies that allow it to decrypt the traffic.

Typically, network IPS can be set up with SSL/TLS decryption capabilities to inspect encrypted data as it traverses the network. This allows the IPS to analyze the content of encrypted packets and apply security policies accordingly.

Monitoring encrypted traffic is critical in detecting hidden malware, unauthorized data exfiltration, and other security threats concealed within SSL/TLS encrypted sessions.

Reference

'Network Security Technologies and Solutions,' by Yusuf Bhaiji, Cisco Press.

'Decrypting SSL/TLS Traffic with IPS,' by Palo Alto Networks.

Total 75 questions
Go to page: of 8