Free Eccouncil ICS-SCADA Exam Actual Questions

The questions for ICS-SCADA were last updated On Jan 17, 2025

Question No. 1

Which of the IEC 62443 Security Levels is identified by a cybercrime/hacker target?

Show Answer Hide Answer
Correct Answer: B

IEC 62443 is an international series of standards on Industrial communication networks and system security, specifically related to Industrial Automation and Control Systems (IACS). Within the IEC 62443 standards, Security Level 3 is defined as protection against deliberate or specialized intrusion. It is designed to safeguard against threats from skilled attackers (cybercriminals or hackers) targeting specific processes or operations within the industrial control system. Reference:

International Electrotechnical Commission, 'IEC 62443 Standards'.


Question No. 2

In what default directory (fully qualified path) does nmap store scripts?

Show Answer Hide Answer
Correct Answer: C

Nmap (Network Mapper) is a network scanning and security auditing tool. Scripts used by Nmap for performing different network discovery and security auditing tasks are stored in /usr/share/nmap/scripts. This directory contains a collection of scripts for NSE (Nmap Scripting Engine), which enables Nmap to perform additional networking tasks, often used for detecting vulnerabilities, misconfigurations, and security-related information about network services. Reference:

Nmap documentation, 'Nmap Scripting Engine (NSE)'.


Question No. 3

The NIST SP 800-53 defines how many management controls?

Show Answer Hide Answer
Correct Answer: B

NIST SP 800-53 is a publication that provides a catalog of security and privacy controls for federal information systems and organizations and promotes the development of secure and resilient federal information and information systems.

According to the NIST SP 800-53 Rev. 5, the framework defines a comprehensive set of controls, which are divided into different families. Among these families, there are specifically nine families categorized under management controls. These include categories such as risk assessment, security planning, program management, and others.

Reference

'NIST Special Publication 800-53 (Rev. 5) Security and Privacy Controls for Information Systems and Organizations.'

NIST website: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf


Question No. 4

Which of the following is the stance that by default has a default deny approach?

Show Answer Hide Answer
Correct Answer: B

In the context of network security policies, a 'Paranoid' stance typically means adopting a default-deny posture. This security approach is one of the most restrictive, where all access is blocked unless explicitly allowed.

A default deny strategy is considered best practice for securing highly sensitive environments, as it minimizes the risk of unauthorized access and reduces the attack surface.

This approach contrasts with more open stances such as Permissive or Promiscuous, which are less restrictive and generally allow more traffic by default.

Reference

'Network Security: Policies and Guidelines for Effective Network Management,' by Jonathan Gossels.

'Best Practices for Implementing a Security Awareness Program,' by Kaspersky Lab.


Question No. 5

Which component of the IT Security Model is usually the least priority in ICS/SCADA Security?

Show Answer Hide Answer
Correct Answer: B

In ICS/SCADA systems, the typical priority hierarchy of the IT Security Model components places Availability and Integrity above Confidentiality. This prioritization is due to the critical nature of operational continuity and data accuracy in industrial control systems, where system downtime or incorrect data can lead to significant operational disruptions or safety issues. Confidentiality, while important, is often considered of lesser priority compared to ensuring systems are operational (Availability) and data is accurate (Integrity). Reference:

National Institute of Standards and Technology (NIST), 'Guide to Industrial Control Systems (ICS) Security'.