Halloween Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

ICS-SCADA ICS/SCADA Cyber Security Exam Questions and Answers

Questions 4

What step of the malware infection installs the malware on the target?

Options:

A.

Drive-by

B.

Init

C.

Dropper

D.

Stager

Buy Now
Questions 5

Which of the following are valid TCP flags?

Options:

A.

None of these

B.

IGP,ACK,SYN,PSH,URG

C.

BGP,FIN,PSH,SYN,ACK

D.

FIN,PSH,URG,RST,SYN

Buy Now
Questions 6

What type of protocol is represented by the number 6?

Options:

A.

IUDP

B.

IGRP

C.

ICMP

D.

TCP

Buy Now
Questions 7

The NIST SP 800-53 defines how many management controls?

Options:

A.

6

B.

9

C.

5

D.

7

Buy Now
Questions 8

What type of communication protocol does Modbus RTU use?

Options:

A.

UDP

B.

ICMP

C.

Serial

D.

SSTP

Buy Now
Questions 9

Which of the following is NOT ICS specific malware?

Options:

A.

Flame

B.

Ha vex

C.

Code Red

D.

Stuxnet

Buy Now
Questions 10

Which of the IEC 62443 security levels is identified by a hacktivist/terrorist target?

Options:

A.

1

B.

3

C.

4

D.

2

Buy Now
Questions 11

Which of the following is NOT an exploit tool?

Options:

A.

Canvas

B.

Core Impact

C.

Metasploit

D.

Nessus

Buy Now
Questions 12

Which of the following is required to determine the correct Security Association?

Options:

A.

SPI

B.

Partner IP address

C.

Protocol

D.

All of these

Buy Now
Questions 13

Which component of the IT Security Model is attacked with modification?

Options:

A.

Authentication

B.

Availability

C.

Integrity

D.

Confidentiality

Buy Now
Questions 14

With respect to the IEC 62443, how many steps are in the Defense in Depth process?

Options:

A.

8

B.

4

C.

6

D.

2

Buy Now
Questions 15

Which of the ICS/SCADA generations is considered networked?

Options:

A.

Fourth

B.

Third

C.

Second

D.

First

Buy Now
Questions 16

A Virtual Private Network (VPN) requires how many Security Associations?

Options:

A.

5

B.

4

C.

3

D.

2

Buy Now
Questions 17

What type of protocol is considered connection-oriented?

Options:

A.

UDP

B.

TCP

C.

ICMP

D.

ARP

Buy Now
Questions 18

Which component of the IT Security Model is the highest priority in ICS/SCADA Security?

Options:

A.

Integrity

B.

Authentication

C.

Availability

D.

Confidentiality

Buy Now
Questions 19

Which of the following can be used to view entire copies of web sites?

Options:

A.

Wayback machine

B.

Google Cache

C.

Netcraft

D.

Bing offline

Buy Now
Questions 20

What is the default size in bits of the Windows Echo Request packet?

Options:

A.

28

B.

24

C.

58

D.

32

Buy Now
Questions 21

Which of the following was attacked using the Stuxnet malware?

Options:

A.

PLCS

B.

PLC3

C.

All of these

D.

PLC7

Buy Now
Questions 22

Which of the registrars contains the information for the domain owners in Latin America?

Options:

A.

AFRINIC

B.

LACNIC

C.

RIPENCC

D.

ARIN

Buy Now
Exam Code: ICS-SCADA
Exam Name: ICS/SCADA Cyber Security Exam
Last Update: Oct 17, 2024
Questions: 75

PDF + Testing Engine

$48  $159.99

Testing Engine

$36  $119.99
buy now ICS-SCADA testing engine

PDF (Q&A)

$30  $99.99
buy now ICS-SCADA pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 18 Oct 2024