ECCouncil ICS/SCADA Cyber Security Exam ICS-SCADA Question # 2 Topic 1 Discussion

ECCouncil ICS/SCADA Cyber Security Exam ICS-SCADA Question # 2 Topic 1 Discussion

ICS-SCADA Exam Topic 1 Question 2 Discussion:
Question #: 2
Topic #: 1

Which of the hacking methodology steps can be used to identify the applications and vendors used?


A.

Enumeration


B.

OSINT


C.

Scanning


D.

Surveillance


Get Premium ICS-SCADA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.