Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the options in the netstat command show the routing table?

A.

c

B.

a

C.

r

D.

s

Full Access
Question # 5

Which of the following is a weakness of a vulnerability scanner?

A.

Detect known vulnerabilities

B.

Not designed to go through filters

C.

Work best on a local network

D.

Maintains a signature database

Full Access
Question # 6

What step of the malware infection installs the malware on the target?

A.

Drive-by

B.

Init

C.

Dropper

D.

Stager

Full Access
Question # 7

Which component of the IT Security Model is the highest priority in ICS/SCADA Security?

A.

Integrity

B.

Authentication

C.

Availability

D.

Confidentiality

Full Access
Question # 8

Which of the ICS/SCADA generations is considered distributed?

A.

Fourth

B.

Second

C.

Third

D.

First

Full Access
Question # 9

Which of the monitor alerts is considered most dangerous?

A.

True Positive

B.

False Positive

C.

False Negative

D.

True Negative

Full Access
Question # 10

How many firewalls are there in the most common ICS/SCADA architecture?

A.

3

B.

1

C.

None of these

D.

2

Full Access
Question # 11

Which of the following steps is used to reveal the IP addressing?

A.

Footprinting

B.

Surveillance

C.

Cover your tracks

D.

Enumeration

Full Access
Question # 12

Which type of Intrusion Prevention System can monitor and validate encrypted data?

A.

Memory

B.

Network

C.

Host

D.

Anomaly

Full Access
Question # 13

How many IPsec rules are there in Microsoft Firewall configuration?

A.

2

B.

5

C.

3

D.

4

Full Access
Question # 14

Which of the following is the stance that by default has a default deny approach?

A.

Permissive

B.

Paranoid

C.

Promiscuous

D.

Prudent

Full Access
Question # 15

Which of the following are not a part of the temporal score in the CVSS? (Select all that apply.)

A.

Attack Vector

B.

User Interaction

C.

Reporting Confidence

D.

Remediation Level

Full Access
Question # 16

Which of the registrars contains the information for the domain owners in Europe?

A.

RIPENCC

B.

AFRINIC

C.

LACNIC

D.

ARIN

Full Access
Question # 17

Which of the following is NOT ICS specific malware?

A.

Flame

B.

Ha vex

C.

Code Red

D.

Stuxnet

Full Access
Question # 18

Which of the following was attacked using the Stuxnet malware?

A.

PLCS

B.

PLC3

C.

All of these

D.

PLC7

Full Access
Question # 19

What is the maximum size in bytes of an ethernet packet?

A.

1200

B.

1400

C.

1500

D.

1300

Full Access
Question # 20

Which of the following is a component of an IDS?

A.

All of these

B.

Respond

C.

Detect

D.

Monitor

Full Access
Question # 21

Which of the following is the name of hacking for a cause?

A.

Lulzec

B.

Anonymous

C.

Hacktivism

D.

Suicide Hackers

Full Access
Question # 22

What does the SPI within IPsec identify?

A.

Security Association

B.

Key Exchange

C.

Decryption algorithm

D.

All of these

Full Access