View Mode
Q: 1
Which component of the IT Security Model is attacked with masquerade?
Options
Q: 2
When monitoring a network, you receive an ICMP type 8 packet. What does this represent?
Options
Q: 3
Who developed the ModBus protocol?
Options
Q: 4
Which of the IEC 62443 Security Levels is identified by a cybercrime/hacker target?
Options
Q: 5
A protocol analyzer that produces raw output is which of the following?
Options
Q: 6
What version of SMB did the WannaCry ransomware attack?
Options
Q: 7
Which component of the IT Security Model is usually the least priority in ICS/SCADA Security?
Options
Q: 8
Which of the following is the stance that by default has a default deny approach?
Options
Q: 9
With respect to data analysis, which of the following is not a step?
Options
Q: 10
How many main score areas are there in the CVSS?2
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE