Pass the ECCouncil Network Security ICS-SCADA Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which component of the IT Security Model is usually the least priority in ICS/SCADA Security?

Options:

A.

Integrity


B.

Confidentiality


C.

Availability


D.

Authentication


Expert Solution
Questions # 2:

Which of the hacking methodology steps can be used to identify the applications and vendors used?

Options:

A.

Enumeration


B.

OSINT


C.

Scanning


D.

Surveillance


Expert Solution
Questions # 3:

How many IPsec rules are there in Microsoft Firewall configuration?

Options:

A.

2


B.

5


C.

3


D.

4


Expert Solution
Questions # 4:

Which of the following ports are used for communications in Modbus TCP?

Options:

A.

205


B.

405


C.

505


D.

502


Expert Solution
Questions # 5:

What is a vulnerability called that is released before a patch comes out?

Options:

A.

Initial


B.

Pre-release


C.

Zero day


D.

First


Expert Solution
Questions # 6:

Which mode within IPsec provides a secure connection tunnel between two endpoints AND protects the sender and the receiver?

Options:

A.

Protected


B.

Tunnel


C.

Transport


D.

Covered


Expert Solution
Questions # 7:

Which of the following steps is used to reveal the IP addressing?

Options:

A.

Footprinting


B.

Surveillance


C.

Cover your tracks


D.

Enumeration


Expert Solution
Questions # 8:

Which type of Intrusion Prevention System can monitor and validate encrypted data?

Options:

A.

Memory


B.

Network


C.

Host


D.

Anomaly


Expert Solution
Questions # 9:

Which of the registrars contains the information for the domain owners in South America?

Options:

A.

AFRINIC


B.

ARIN


C.

LACNIC


D.

RIPENCC


Expert Solution
Questions # 10:

How many IPsec modes are there?

Options:

A.

Four


B.

Three


C.

None of these


D.

Two


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions