Free Eccouncil ICS-SCADA Exam Actual Questions

The questions for ICS-SCADA were last updated On Dec 17, 2024

Question No. 1

A protocol analyzer that produces raw output is which of the following?

Show Answer Hide Answer
Correct Answer: A

tcpdump is a powerful command-line packet analyzer used primarily in UNIX and UNIX-like operating systems; it allows the capture and display of TCP/IP and other packets being transmitted or received over a network to which the computer is attached.

Unlike graphical tools like Wireshark, tcpdump provides raw output of the packet captures directly to the terminal or a specified file, making it ideal for deep dive network analysis, especially in environments where a graphical user interface is unavailable.

tcpdump uses the libpcap library to capture packet data, which allows it to support a wide range of command-line options to filter and display packet information according to user needs.

Reference

'tcpdump manual page,' by the Tcpdump Group.

'Practical Packet Analysis Using Wireshark to Solve Real-World Network Problems,' by Chris Sanders, No Starch Press.


Question No. 2

What is a vulnerability called that is released before a patch comes out?

Show Answer Hide Answer
Correct Answer: C

A vulnerability that is exploited before the vendor has issued a patch or even before the vulnerability is known to the vendor is referred to as a 'zero-day' vulnerability. The term 'zero-day' refers to the number of days the software vendor has had to address and patch the vulnerability since it was made public---zero, in this case. Reference:

Symantec Security Response, 'Zero Day Initiative'.


Question No. 3

When monitoring a network, you receive an ICMP type 8 packet. What does this represent?

Show Answer Hide Answer
Correct Answer: A

ICMP (Internet Control Message Protocol) is used in network devices, like routers, to send error messages and operational information indicating success or failure when communicating with another IP address.

An ICMP type 8 packet specifically is an 'Echo Request.' It is used primarily by the ping command to test the connectivity between two nodes.

When a device sends an ICMP Echo Request, it expects to receive an ICMP Echo Reply (type 0) from the target node. This mechanism helps in diagnosing the state and reachability of a network on the Internet or within a private network.

Reference

RFC 792 Internet Control Message Protocol: https://tools.ietf.org/html/rfc792

Internet Assigned Numbers Authority (IANA) ICMP Parameters:


Question No. 4

At what layer does a switch normally operate?

Show Answer Hide Answer
Correct Answer: C

A network switch typically operates at Layer 2 of the OSI model, which is the Data Link layer. This layer is responsible for node-to-node data transfer---a function that involves handling data frames between physical devices on the same network or link. The switch uses MAC addresses to forward data to the appropriate destination within the network. Reference:

Andrew S. Tanenbaum, 'Computer Networks'.


Question No. 5

Which of the IPsec headers contains the Security Parameters Index (SPI)?

Show Answer Hide Answer
Correct Answer: B

IPsec uses two main protocols to secure network communications: Authentication Header (AH) and Encapsulating Security Payload (ESP).

Both AH and ESP use a Security Parameters Index (SPI), which is a critical component of their headers. The SPI is a unique identifier that enables the receiver to select the correct security association for processing incoming packets.

AH provides authentication and integrity, while ESP provides confidentiality, in addition to authentication and integrity. Both protocols use the SPI to manage these functions securely.

Reference

'IPsec Security Architecture,' RFC 4302 (AH) and RFC 4303 (ESP).

'IPsec Explained,' by Juniper Networks.