ECCouncil ICS-SCADA - ICS-SCADA Cyber Security Exam
Page: 2 / 15
Total 75 questions
Question #6 (Topic: Exam A)
When monitoring a network, you receive an ICMP type 8 packet. What does this represent?
A. Echo request
B. Echo start
C. Echo recall
D. Echo reply
Answer: A
Question #7 (Topic: Exam A)
What step of the malware infection installs the malware on the target?
A. Drive-by
B. Init
C. Dropper
D. Stager
Answer: C
Question #8 (Topic: Exam A)
The vulnerability that led to the WannaCry ransomware infections affected which protocol?
A. Samba
B. None of these
C. RPC
D. SMB
Answer: D
Question #9 (Topic: Exam A)
Which of the registrars contains the information for the domain owners in Europe?
A. RIPENCC
B. AFRINIC
C. LACNIC
D. ARIN
Answer: A
Question #10 (Topic: Exam A)
Which component of the IT Security Model is attacked with interruption?
A. Confidentiality
B. Availability
C. Authentication
D. Integrity
Answer: B