New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ICS-SCADA Exam Dumps - ICS/SCADA Cyber Security Exam

Go to page:
Question # 9

Which of the following are NOT components of an ICS/SCADA network device?

A.

Low processing threshold

B.

Legacy systems

C.

High bandwidth networks

D.

Weak network stack

Full Access
Question # 10

Which of the registrars contains the information for the domain owners in Latin America?

A.

AFRINIC

B.

LACNIC

C.

RIPENCC

D.

ARIN

Full Access
Question # 11

Which type of Intrusion Prevention System can monitor and validate encrypted data?

A.

Memory

B.

Network

C.

Host

D.

Anomaly

Full Access
Question # 12

Which of the following names represents inbound filtering?

A.

Funnel

B.

Sanity

C.

Egress

D.

Ingress

Full Access
Question # 13

Which component of the IT Security Model is attacked with masquerade?

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Authentication

Full Access
Question # 14

Which of the following is considered the best way to counter packet monitoring for a switch?

A.

Tap

B.

Duplication

C.

SPAN

D.

Port mirror

Full Access
Question # 15

Which of the monitor alerts is considered most dangerous?

A.

True Positive

B.

False Positive

C.

False Negative

D.

True Negative

Full Access
Question # 16

In physical to logical asset protections, what threat can be directed against the network?

A.

Elevation of privileges

B.

Flood the switch

C.

All of these

D.

Crack the password

Full Access
Go to page: