Free Eccouncil ICS-SCADA Exam Actual Questions

The questions for ICS-SCADA were last updated On Nov 20, 2024

Question No. 1

What is the size in bytes of the TCP sequence number in the header?

Show Answer Hide Answer
Correct Answer: D

In the Transmission Control Protocol (TCP) header, the sequence number field is crucial for ensuring the correct sequencing of the packets sent over a network.

The sequence number field in the TCP header is 32 bits long, which equates to 4 bytes.

This sequence number is used to keep track of the bytes in a sequence that are transferred over a TCP connection, ensuring that packets are arranged in the correct order and data integrity is maintained during transmission.

Reference

Postel, J., 'Transmission Control Protocol,' RFC 793, September 1981.

'TCP/IP Guide,' Kozierok, C. M., 2005.


Question No. 2

Which of the ICS/SCADA generations is considered distributed?

Show Answer Hide Answer
Correct Answer: C

The third generation of ICS/SCADA systems is considered distributed. This generation features systems that are networked and interconnected, typically using a variety of standard communication protocols. This distribution allows for broader connectivity and integration with other systems, enhancing operational flexibility and efficiency but also introducing more vectors for potential cyber threats. Reference:

Joseph Weiss, 'Protecting Industrial Control Systems from Electronic Threats'.

The third generation of ICS/SCADA systems is considered distributed. These systems emerged in the late 1990s and early 2000s and were designed to overcome the limitations of earlier generations by leveraging networked architectures.

Distributed Architecture: Third-generation systems distributed control functions across multiple interconnected devices and systems, providing greater scalability and flexibility.

Network Integration: These systems integrated more extensively with IT networks, allowing for remote monitoring and control.

Standard Protocols: Adoption of standard communication protocols (e.g., Ethernet, TCP/IP) facilitated interoperability and integration with other systems.

Enhanced Redundancy: Improved fault tolerance and redundancy were implemented to ensure system reliability.

Due to these features, the third generation is known as the distributed generation.

Reference

'SCADA Systems,' SCADAHacker, SCADA Generations.


Question No. 3

What does the SPI within IPsec identify?

Show Answer Hide Answer
Correct Answer: A

Within IPsec, the SPI (Security Parameter Index) is a critical component that uniquely identifies a Security Association (SA) for the IPsec session. The SPI is used in the IPsec headers to help the receiving party determine which SA has been agreed upon for processing the incoming packets. This identification is crucial for the proper operation and management of security policies applied to the encrypted data flows. Reference:

RFC 4301, 'Security Architecture for the Internet Protocol,' which discusses the structure and use of the SPI in IPsec communications.


Question No. 4

Which component of the IT Security Model is attacked with interruption?

Show Answer Hide Answer
Correct Answer: B

The IT Security Model commonly refers to the CIA Triad, which stands for Confidentiality, Integrity, and Availability.

An attack on 'Availability' is aimed at disrupting the normal functioning and access to data or resources in a network. This type of attack can include actions such as DDoS (Distributed Denial of Service), where overwhelming traffic is sent to a system to make it unresponsive.

The main goal of attacks on availability is to prevent legitimate users from accessing systems or information, which can have significant implications for business operations and security.

Reference

Understanding the CIA Triad in Cybersecurity: https://www.cyber.gov.au/acsc/view-all-content/publications/cia-triad

Denial of Service -- What it is and how to prevent it: https://www.us-cert.gov/ncas/tips/ST04-015


Question No. 5

Which of the following is the name of hacking for a cause?

Show Answer Hide Answer
Correct Answer: C

Hacktivism refers to the act of hacking, or breaking into computer systems, for a politically or socially motivated purpose. Hacktivists use their skills to promote a cause, influence public opinion, or bring attention to social injustices. The term combines 'hacking' and 'activism,' representing a form of activism that takes place within cyberspace. Reference:

Dorothy E. Denning, 'Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy'.