Free Eccouncil ICS-SCADA Exam Actual Questions

The questions for ICS-SCADA were last updated On Feb 19, 2025

At ValidExamDumps, we consistently monitor updates to the Eccouncil ICS-SCADA exam questions by Eccouncil. Whenever our team identifies changes in the exam questions,exam objectives, exam focus areas or in exam requirements, We immediately update our exam questions for both PDF and online practice exams. This commitment ensures our customers always have access to the most current and accurate questions. By preparing with these actual questions, our customers can successfully pass the Eccouncil ICS/SCADA Cyber Security exam on their first attempt without needing additional materials or study guides.

Other certification materials providers often include outdated or removed questions by Eccouncil in their Eccouncil ICS-SCADA exam. These outdated questions lead to customers failing their Eccouncil ICS/SCADA Cyber Security exam. In contrast, we ensure our questions bank includes only precise and up-to-date questions, guaranteeing their presence in your actual exam. Our main priority is your success in the Eccouncil ICS-SCADA exam, not profiting from selling obsolete exam questions in PDF or Online Practice Test.

 

Question No. 1

Which mode within IPsec provides secure connection between two endpoints but does NOT protect the sender and the receiver?

Show Answer Hide Answer
Correct Answer: C

IPsec offers two modes of operation: Transport mode and Tunnel mode.

Transport mode in IPsec provides security for the payload (the message part) of each packet along the communication path between two endpoints.

In this mode, the IP header of the original packet is not encrypted; it secures only the payload, not protecting the headers. This means while the data is protected, information about the sender and receiver as contained in the IP header is not obscured.

Reference

'Security Architecture for IP,' RFC 4301.

IPsec documentation, Internet Engineering Task Force (IETF).


Question No. 2

Which of the following components is not part of the Authentication Header (AH)?

Show Answer Hide Answer
Correct Answer: C

The Authentication Header (AH) is a component of the IPsec protocol suite that provides authentication and integrity to the communications. AH ensures that the contents of the communications have not been altered in transit (integrity) and verifies the sending and receiving parties (authentication). However, AH does not provide confidentiality, which would involve encrypting the payload data. Confidentiality is provided by the Encapsulating Security Payload (ESP), another component of IPsec. Reference:

RFC 4302, 'IP Authentication Header'.


Question No. 3

In what default directory (fully qualified path) does nmap store scripts?

Show Answer Hide Answer
Correct Answer: C

Nmap (Network Mapper) is a network scanning and security auditing tool. Scripts used by Nmap for performing different network discovery and security auditing tasks are stored in /usr/share/nmap/scripts. This directory contains a collection of scripts for NSE (Nmap Scripting Engine), which enables Nmap to perform additional networking tasks, often used for detecting vulnerabilities, misconfigurations, and security-related information about network services. Reference:

Nmap documentation, 'Nmap Scripting Engine (NSE)'.


Question No. 4

Which of the following ports are used for communications in Modbus TCP?

Show Answer Hide Answer
Correct Answer: D

Modbus TCP is a variant of the Modbus family of simple, networked protocols aimed at industrial automation applications. Unlike the original Modbus protocol, which runs over serial links, Modbus TCP runs over TCP/IP networks.

Port 502 is the standard TCP port used for Modbus TCP communications. This port is designated for Modbus messages encapsulated in a TCP/IP wrapper, facilitating communication between Modbus devices and management systems over an IP network.

Knowing the correct port number is crucial for network configuration, security settings, and troubleshooting communications within a Modbus-enabled ICS/SCADA environment.

Reference

Modbus Organization, 'MODBUS Application Protocol Specification V1.1b3'.

'Modbus TCP/IP -- A Comprehensive Network protocol,' by Schneider Electric.


Question No. 5

The vulnerability that led to the WannaCry ransomware infections affected which protocol?

Show Answer Hide Answer
Correct Answer: D

WannaCry is a ransomware attack that spread rapidly across multiple computer networks in May 2017.

The vulnerability exploited by the WannaCry ransomware was in the Microsoft Windows implementation of the Server Message Block (SMB) protocol.

Specifically, the exploit, known as EternalBlue, targeted a flaw in the SMBv1 protocol. This flaw allowed the ransomware to spread within corporate networks without any user interaction, making it one of the fastest-spreading and most harmful cyberattacks at the time.

Reference

Microsoft Security Bulletin MS17-010 - Critical: https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2017/ms17-010

National Vulnerability Database, CVE-2017-0144: https://nvd.nist.gov/vuln/detail/CVE-2017-0144