Pass the ECCouncil Network Security ICS-SCADA Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the monitor alerts is considered most dangerous?

Options:

A.

True Positive


B.

False Positive


C.

False Negative


D.

True Negative


Expert Solution
Questions # 12:

Which of the ICS/SCADA generations is considered monolithic?

Options:

A.

Second


B.

First


C.

Fourth


D.

Third


Expert Solution
Questions # 13:

Who developed the ModBus protocol?

Options:

A.

Siemens


B.

BAG


C.

Modicon


D.

Motorola


Expert Solution
Questions # 14:

At what layer does a switch normally operate?

Options:

A.

4


B.

7


C.

2


D.

3


Expert Solution
Questions # 15:

Which of the following is considered the best way to counter packet monitoring for a switch?

Options:

A.

Tap


B.

Duplication


C.

SPAN


D.

Port mirror


Expert Solution
Questions # 16:

What is used in the Modbus protocol to tell the slave to read or write?

Options:

A.

None of these


B.

Function code


C.

Unit ID


D.

Slave command


Expert Solution
Questions # 17:

Which of the following is the stance on risk that by default allows traffic with a default permit approach?

Options:

A.

Paranoid


B.

Prudent


C.

Promiscuous


D.

Permissive


Expert Solution
Questions # 18:

Which component of the IT Security Model is attacked with masquerade?

Options:

A.

Integrity


B.

Availability


C.

Confidentiality


D.

Authentication


Expert Solution
Questions # 19:

In physical to logical asset protections, what threat can be directed against the network?

Options:

A.

Elevation of privileges


B.

Flood the switch


C.

All of these


D.

Crack the password


Expert Solution
Questions # 20:

Which of the following was attacked using the Stuxnet malware?

Options:

A.

PLCS


B.

PLC3


C.

All of these


D.

PLC7


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions