Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

ICS-SCADA ICS/SCADA Cyber Security Exam Questions and Answers

Questions 4

When monitoring a network, you receive an ICMP type 8 packet. What does this represent?

Options:

A.

Echo request

B.

Echo start

C.

Echo recall

D.

Echo reply

Buy Now
Questions 5

Which of the following is a weakness of a vulnerability scanner?

Options:

A.

Detect known vulnerabilities

B.

Not designed to go through filters

C.

Work best on a local network

D.

Maintains a signature database

Buy Now
Questions 6

Which of the following are NOT components of an ICS/SCADA network device?

Options:

A.

Low processing threshold

B.

Legacy systems

C.

High bandwidth networks

D.

Weak network stack

Buy Now
Questions 7

Which of the registrars contains the information for the domain owners in Europe?

Options:

A.

RIPENCC

B.

AFRINIC

C.

LACNIC

D.

ARIN

Buy Now
Questions 8

Which mode within IPsec provides secure connection between two endpoints but does NOT protect the sender and the receiver?

Options:

A.

Tunnel

B.

Covered

C.

Transport

D.

Protected

Buy Now
Questions 9

Which of the following are required functions of information management?

Options:

A.

All of these

B.

Date enrichment

C.

Normalization

D.

Correlation

Buy Now
Questions 10

What is a vulnerability called that is released before a patch comes out?

Options:

A.

Initial

B.

Pre-release

C.

Zero day

D.

First

Buy Now
Questions 11

Which of the following is the name of hacking for a cause?

Options:

A.

Lulzec

B.

Anonymous

C.

Hacktivism

D.

Suicide Hackers

Buy Now
Questions 12

What version of SMB did the WannaCry ransomware attack?

Options:

A.

All of these

B.

2

C.

1

D.

3

Buy Now
Questions 13

What type of communication protocol does Modbus RTU use?

Options:

A.

UDP

B.

ICMP

C.

Serial

D.

SSTP

Buy Now
Questions 14

Which of the following names represents inbound filtering?

Options:

A.

Funnel

B.

Sanity

C.

Egress

D.

Ingress

Buy Now
Questions 15

What is the default size in bits of the Windows Echo Request packet?

Options:

A.

28

B.

24

C.

58

D.

32

Buy Now
Questions 16

How many IPsec rules are there in Microsoft Firewall configuration?

Options:

A.

2

B.

5

C.

3

D.

4

Buy Now
Questions 17

Which of the following is NOT ICS specific malware?

Options:

A.

Flame

B.

Ha vex

C.

Code Red

D.

Stuxnet

Buy Now
Questions 18

With respect to the IEC 62443, how many steps are in the Defense in Depth process?

Options:

A.

8

B.

4

C.

6

D.

2

Buy Now
Questions 19

Which of the IEC 62443 Security Levels is identified by a cybercrime/hacker target?

Options:

A.

4

B.

3

C.

1

D.

2

Buy Now
Questions 20

Which of the CVSS metrics refer to the exploit quotient of the vulnerability?

Options:

A.

Temporal

B.

Environmental

C.

IBase

D.

All of these

Buy Now
Questions 21

Which of the following is required to determine the correct Security Association?

Options:

A.

SPI

B.

Partner IP address

C.

Protocol

D.

All of these

Buy Now
Questions 22

Which of the following was attacked using the Stuxnet malware?

Options:

A.

PLCS

B.

PLC3

C.

All of these

D.

PLC7

Buy Now
Exam Code: ICS-SCADA
Exam Name: ICS/SCADA Cyber Security Exam
Last Update: Oct 14, 2025
Questions: 75

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99