Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

ICS-SCADA ECCouncil ICS/SCADA Cyber Security Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ECCouncil ICS-SCADA ICS/SCADA Cyber Security Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 75 questions

What share does the WannaCry ransomware use to connect with the target?

A.

$IPC

B.

$Admin

C.

$SPOOL

D.

$C

With respect to data analysis, which of the following is not a step?

A.

Enumeration

B.

All of these

C.

vulnerabilities

D.

Scanning for targets

Which of the following are not a part of the temporal score in the CVSS? (Select all that apply.)

A.

Attack Vector

B.

User Interaction

C.

Reporting Confidence

D.

Remediation Level

What is the default size in bits of the Windows Echo Request packet?

A.

28

B.

24

C.

58

D.

32

How many main score areas are there in the CVSS?2

A.

2

B.

4

C.

3

D.

None of these

Which of the monitor alerts is considered most dangerous?

A.

True Positive

B.

False Positive

C.

False Negative

D.

True Negative

Which of the IPsec headers contains the Security Parameters Index (SPI)?

A.

AH

B.

Both AH and ESP

C.

ESP

D.

ICV

What version of SMB did the WannaCry ransomware attack?

A.

All of these

B.

2

C.

1

D.

3

Which of the CVSS metrics refer to the exploit quotient of the vulnerability?

A.

Temporal

B.

Environmental

C.

IBase

D.

All of these

Which of the following is NOT an exploit tool?

A.

Canvas

B.

Core Impact

C.

Metasploit

D.

Nessus

How many IPsec rules are there in Microsoft Firewall configuration?

A.

2

B.

5

C.

3

D.

4

With respect to the IEC 62443, how many steps are in the Defense in Depth process?

A.

8

B.

4

C.

6

D.

2

How many IPsec modes are there?

A.

Four

B.

Three

C.

None of these

D.

Two

When monitoring a network, you receive an ICMP type 8 packet. What does this represent?

A.

Echo request

B.

Echo start

C.

Echo recall

D.

Echo reply

A Virtual Private Network (VPN) requires how many Security Associations?

A.

5

B.

4

C.

3

D.

2

Which of the following names represents inbound filtering?

A.

Funnel

B.

Sanity

C.

Egress

D.

Ingress

Which of the following was attacked using the Stuxnet malware?

A.

PLCS

B.

PLC3

C.

All of these

D.

PLC7

Which of the registrars contains the information for the domain owners in Europe?

A.

RIPENCC

B.

AFRINIC

C.

LACNIC

D.

ARIN

Which of the registrars contains the information for the domain owners in Latin America?

A.

AFRINIC

B.

LACNIC

C.

RIPENCC

D.

ARIN

In what default directory (fully qualified path) does nmap store scripts?

A.

/usr/share/scripts

B.

/ust/share/nmap/scripts

C.

/usr/share/nmap

D.

/opt

Page: 1 / 2
Total 75 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved