Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

ICS/SCADA Cyber Security Exam Question and Answers

ICS/SCADA Cyber Security Exam

Last Update Oct 15, 2025
Total Questions : 75

We are offering FREE ICS-SCADA ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare ICS-SCADA free exam questions and then go for complete pool of ICS/SCADA Cyber Security Exam test questions that will help you more.

ICS-SCADA pdf

ICS-SCADA PDF

$42  $104.99
ICS-SCADA Engine

ICS-SCADA Testing Engine

$50  $124.99
ICS-SCADA PDF + Engine

ICS-SCADA PDF + Testing Engine

$66  $164.99
Questions 1

At what layer does a switch normally operate?

Options:

A.  

4

B.  

7

C.  

2

D.  

3

Discussion 0
Questions 2

Which of the following names represents inbound filtering?

Options:

A.  

Funnel

B.  

Sanity

C.  

Egress

D.  

Ingress

Discussion 0
Questions 3

Which mode within IPsec provides secure connection between two endpoints but does NOT protect the sender and the receiver?

Options:

A.  

Tunnel

B.  

Covered

C.  

Transport

D.  

Protected

Discussion 0
Questions 4

Which of the IEC 62443 Security Levels is identified by a cybercrime/hacker target?

Options:

A.  

4

B.  

3

C.  

1

D.  

2

Discussion 0
Questions 5

Which of the IEC 62443 security levels is identified by a hacktivist/terrorist target?

Options:

A.  

1

B.  

3

C.  

4

D.  

2

Discussion 0
Questions 6

Which publication from NIST provides guidance on Industrial Control Systems?

Options:

A.  

NIST SP 800-90

B.  

NIST SP 800-82

C.  

NIST SP 800-77

D.  

NIST SP 800-44

Discussion 0
Questions 7

Which of the following steps is used to reveal the IP addressing?

Options:

A.  

Footprinting

B.  

Surveillance

C.  

Cover your tracks

D.  

Enumeration

Discussion 0
Questions 8

Which component of the IT Security Model is the highest priority in ICS/SCADA Security?

Options:

A.  

Integrity

B.  

Authentication

C.  

Availability

D.  

Confidentiality

Discussion 0
Questions 9

Which of the following are required functions of information management?

Options:

A.  

All of these

B.  

Date enrichment

C.  

Normalization

D.  

Correlation

Discussion 0
Questions 10

Which of the ICS/SCADA generations is considered monolithic?

Options:

A.  

Second

B.  

First

C.  

Fourth

D.  

Third

Discussion 0
Questions 11

What share does the WannaCry ransomware use to connect with the target?

Options:

A.  

$IPC

B.  

$Admin

C.  

$SPOOL

D.  

$C

Discussion 0
Questions 12

Which of the hacking methodology steps can be used to identify the applications and vendors used?

Options:

A.  

Enumeration

B.  

OSINT

C.  

Scanning

D.  

Surveillance

Discussion 0
Questions 13

Which of the following is the stance on risk that by default allows traffic with a default permit approach?

Options:

A.  

Paranoid

B.  

Prudent

C.  

Promiscuous

D.  

Permissive

Discussion 0
Questions 14

What version of SMB did the WannaCry ransomware attack?

Options:

A.  

All of these

B.  

2

C.  

1

D.  

3

Discussion 0
Questions 15

In physical to logical asset protections, what threat can be directed against the network?

Options:

A.  

Elevation of privileges

B.  

Flood the switch

C.  

All of these

D.  

Crack the password

Discussion 0
Questions 16

Which of the following is NOT ICS specific malware?

Options:

A.  

Flame

B.  

Ha vex

C.  

Code Red

D.  

Stuxnet

Discussion 0
Questions 17

How many firewalls are there in the most common ICS/SCADA architecture?

Options:

A.  

3

B.  

1

C.  

None of these

D.  

2

Discussion 0
Questions 18

Which of the following was attacked using the Stuxnet malware?

Options:

A.  

PLCS

B.  

PLC3

C.  

All of these

D.  

PLC7

Discussion 0
Questions 19

Which of the following is considered the best way to counter packet monitoring for a switch?

Options:

A.  

Tap

B.  

Duplication

C.  

SPAN

D.  

Port mirror

Discussion 0
Questions 20

Which component of the IT Security Model is attacked with eavesdropping and interception?

Options:

A.  

Confidentiality

B.  

Availability

C.  

Integrity

D.  

Authentication

Discussion 0
Questions 21

Which of the following is the stance that by default has a default deny approach?

Options:

A.  

Permissive

B.  

Paranoid

C.  

Promiscuous

D.  

Prudent

Discussion 0
Questions 22

What type of communication protocol does Modbus RTU use?

Options:

A.  

UDP

B.  

ICMP

C.  

Serial

D.  

SSTP

Discussion 0