Free Eccouncil ICS-SCADA Exam Actual Questions

The questions for ICS-SCADA were last updated On Sep 15, 2024

Question No. 1

Which of the following is the stance that by default has a default deny approach?

Show Answer Hide Answer
Correct Answer: B

In the context of network security policies, a 'Paranoid' stance typically means adopting a default-deny posture. This security approach is one of the most restrictive, where all access is blocked unless explicitly allowed.

A default deny strategy is considered best practice for securing highly sensitive environments, as it minimizes the risk of unauthorized access and reduces the attack surface.

This approach contrasts with more open stances such as Permissive or Promiscuous, which are less restrictive and generally allow more traffic by default.

Reference

'Network Security: Policies and Guidelines for Effective Network Management,' by Jonathan Gossels.

'Best Practices for Implementing a Security Awareness Program,' by Kaspersky Lab.


Question No. 2

How many IPsec rules are there in Microsoft Firewall configuration?

Show Answer Hide Answer
Correct Answer: D

In the configuration of Microsoft Windows Firewall with Advanced Security, you can define IPsec rules as part of your security policy. Typically, these rules can be organized into four main categories: Allow connection, Block connection, Allow if secure (which can specify encryption or authentication requirements), and Custom. While the interface and features can vary slightly between Windows versions, four fundamental types of rules regarding how traffic is handled are commonly supported. Reference:

Microsoft documentation, 'Windows Firewall with Advanced Security'.


Question No. 3

Which component of the IT Security Model is usually the least priority in ICS/SCADA Security?

Show Answer Hide Answer
Correct Answer: B

In ICS/SCADA systems, the typical priority hierarchy of the IT Security Model components places Availability and Integrity above Confidentiality. This prioritization is due to the critical nature of operational continuity and data accuracy in industrial control systems, where system downtime or incorrect data can lead to significant operational disruptions or safety issues. Confidentiality, while important, is often considered of lesser priority compared to ensuring systems are operational (Availability) and data is accurate (Integrity). Reference:

National Institute of Standards and Technology (NIST), 'Guide to Industrial Control Systems (ICS) Security'.


Question No. 4

What is the maximum size in bytes of an ethernet packet?

Show Answer Hide Answer
Correct Answer: C

The maximum transmission unit (MTU) for Ethernet, which is the largest size of an Ethernet packet or frame that can be sent over the network, is typically 1500 bytes. This size does not include the Ethernet frame's preamble and start frame delimiter but does include all other headers and the payload. Ethernet's MTU of 1500 bytes is a standard for most Ethernet networks, especially those conforming to the IEEE 802.3 standard. Reference:

IEEE 802.3-2012, 'Standard for Ethernet'.


Question No. 5

In physical to logical asset protections, what threat can be directed against the network?

Show Answer Hide Answer
Correct Answer: C

In the context of physical to logical asset protection in network security, several threats can be directed against the network, including:

Elevation of Privileges: Where unauthorized users gain higher-level permissions improperly.

Flood the Switch: Typically involves a DoS attack where the switch is overwhelmed with traffic, preventing normal operations.

Crack the Password: An attack aimed at gaining unauthorized access by breaking through password security. All these threats can potentially compromise the network's security and the safety of its physical and logical assets. Reference:

CompTIA Security+ Guide to Network Security Fundamentals.