Pre-Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ICS-SCADA Exam Dumps - ICS/SCADA Cyber Security Exam

Question # 4

Which of the following are valid TCP flags?

A.

None of these

B.

IGP,ACK,SYN,PSH,URG

C.

BGP,FIN,PSH,SYN,ACK

D.

FIN,PSH,URG,RST,SYN

Full Access
Question # 5

Which of the following is known as a prebuilt directional gateway that is unidirectional?

A.

Firewall

B.

Data Diode

C.

None of these

D.

Unigate

Full Access
Question # 6

Which mode within IPsec provides secure connection between two endpoints but does NOT protect the sender and the receiver?

A.

Tunnel

B.

Covered

C.

Transport

D.

Protected

Full Access
Question # 7

The vulnerability that led to the WannaCry ransomware infections affected which protocol?

A.

Samba

B.

None of these

C.

RPC

D.

SMB

Full Access
Question # 8

Which of the IEC 62443 security levels is identified by a hacktivist/terrorist target?

A.

1

B.

3

C.

4

D.

2

Full Access
Question # 9

Which of the following are NOT components of an ICS/SCADA network device?

A.

Low processing threshold

B.

Legacy systems

C.

High bandwidth networks

D.

Weak network stack

Full Access
Question # 10

Which of the registrars contains the information for the domain owners in Latin America?

A.

AFRINIC

B.

LACNIC

C.

RIPENCC

D.

ARIN

Full Access
Question # 11

Which type of Intrusion Prevention System can monitor and validate encrypted data?

A.

Memory

B.

Network

C.

Host

D.

Anomaly

Full Access
Question # 12

Which of the following names represents inbound filtering?

A.

Funnel

B.

Sanity

C.

Egress

D.

Ingress

Full Access
Question # 13

Which component of the IT Security Model is attacked with masquerade?

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Authentication

Full Access
Question # 14

Which of the following is considered the best way to counter packet monitoring for a switch?

A.

Tap

B.

Duplication

C.

SPAN

D.

Port mirror

Full Access
Question # 15

Which of the monitor alerts is considered most dangerous?

A.

True Positive

B.

False Positive

C.

False Negative

D.

True Negative

Full Access
Question # 16

In physical to logical asset protections, what threat can be directed against the network?

A.

Elevation of privileges

B.

Flood the switch

C.

All of these

D.

Crack the password

Full Access
Question # 17

Which of the ICS/SCADA generations is considered monolithic?

A.

Second

B.

First

C.

Fourth

D.

Third

Full Access
Question # 18

Which of the following is a component of an IDS?

A.

All of these

B.

Respond

C.

Detect

D.

Monitor

Full Access
Question # 19

Which of the following steps is used to reveal the IP addressing?

A.

Footprinting

B.

Surveillance

C.

Cover your tracks

D.

Enumeration

Full Access
Question # 20

With respect to data analysis, which of the following is not a step?

A.

Enumeration

B.

All of these

C.

vulnerabilities

D.

Scanning for targets

Full Access
Question # 21

Which of the following is required to determine the correct Security Association?

A.

SPI

B.

Partner IP address

C.

Protocol

D.

All of these

Full Access
Question # 22

What does the SPI within IPsec identify?

A.

Security Association

B.

Key Exchange

C.

Decryption algorithm

D.

All of these

Full Access