Eccouncil ICS-SCADA ICS/SCADA Cyber Security Exam Practice Test

Page: 1 / 14
Total 75 questions
Question 1

Which of the CVSS metrics refer to the exploit quotient of the vulnerability?



Answer : A

The Common Vulnerability Scoring System (CVSS) uses several metrics to assess the severity of vulnerabilities. Among them, the Temporal metric group specifically reflects the exploit quotient of a vulnerability.

Temporal metrics consider factors that change over time after a vulnerability is initially assessed. These include:

Exploit Code Maturity: This assesses the likelihood of the vulnerability being exploited based on the availability and maturity of exploit code.

Remediation Level: The level of remediation available for the vulnerability, which influences the ease of mitigation.

Report Confidence: This metric measures the reliability of the reports about the vulnerability.

These temporal factors directly affect the exploitability and potential threat posed by a vulnerability, adjusting the base score to provide a more current view of the risk.

Reference

Common Vulnerability Scoring System v3.1: User Guide.

'Understanding CVSS,' by FIRST (Forum of Incident Response and Security Teams).


Question 2

Which of the following are NOT components of an ICS/SCADA network device?



Answer : C

Industrial Control Systems (ICS) and SCADA networks typically operate in environments where the available bandwidth is limited. They are often characterized by:

Low processing threshold: ICS/SCADA devices generally have limited processing capabilities due to their specialized and often legacy nature.

Legacy systems: Many ICS/SCADA systems include older technology that might not support newer security protocols or high-speed data transfer.

Weak network stack: These systems may have incomplete or less robust network stacks that can be susceptible to specific types of network attacks.

High bandwidth networks are not typical of ICS/SCADA environments, as these systems do not usually require or support high-speed data transmission due to their operational requirements and the older technology often used in such environments.

Reference

'Navigating the Challenges of Industrial Control Systems,' by ISA-99 Industrial Automation and Control Systems Security.

'Cybersecurity for Industrial Control Systems,' by the Department of Homeland Security.


Question 3

What type of protocol is represented by the number 6?



Answer : D

The protocol number 6 represents TCP (Transmission Control Protocol) in the Internet Protocol suite. TCP is a core protocol of the Internet Protocol suite and operates at the transport layer, providing reliable, ordered, and error-checked delivery of a stream of bytes between applications running on hosts communicating via an IP network. Reference:

RFC 793, 'Transmission Control Protocol,' which specifies the detailed operation of TCP.


Question 4

What does the SPI within IPsec identify?



Answer : A

Within IPsec, the SPI (Security Parameter Index) is a critical component that uniquely identifies a Security Association (SA) for the IPsec session. The SPI is used in the IPsec headers to help the receiving party determine which SA has been agreed upon for processing the incoming packets. This identification is crucial for the proper operation and management of security policies applied to the encrypted data flows. Reference:

RFC 4301, 'Security Architecture for the Internet Protocol,' which discusses the structure and use of the SPI in IPsec communications.


Question 5

Which of the IEC 62443 security levels is identified by a hacktivist/terrorist target?



Answer : C

IEC 62443 defines multiple security levels (SLs) tailored to address different types of threats and attackers in industrial control systems.

Security Level 4 (SL4) is designed to protect against sophisticated attacks by adversaries such as hacktivists or terrorists. SL4 involves threats that are targeted with specific intent against the organization, using advanced skills and means.

This level assumes that the adversary is capable of sustained and focused efforts with significant resources, including state-level actors or well-funded groups, aiming at causing widespread disruption or damage.

Reference

IEC 62443-3-3: System security requirements and security levels.

'Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems,' by Eric Knapp.


Question 6

Which of the following steps is used to reveal the IP addressing?



Answer : D

Enumeration is a step in the information-gathering phase of a penetration test or cyber attack where an attacker actively engages with the target to extract detailed information, including IP addressing.

Enumeration: During enumeration, the attacker interacts with network services to gather information such as user accounts, network shares, and IP addresses.

Techniques: Common techniques include using tools like Nmap, Netcat, and Nessus to scan for open ports, services, and to identify the IP addresses in use.

Purpose: The goal is to map the network's structure, find potential entry points, and understand the layout of the target environment.

Because enumeration involves discovering detailed information including IP addresses, it is the correct answer.

Reference

'Enumeration in Ethical Hacking,' GeeksforGeeks, Enumeration.

'Network Enumeration,' Wikipedia, Network Enumeration.


Question 7

What type of protocol is considered connection-oriented?



Answer : B

TCP (Transmission Control Protocol) is a connection-oriented protocol used in the majority of internet communications.

Connection-oriented protocols like TCP require a connection to be established between the communicating devices before data is transmitted. This ensures reliable and ordered delivery of data.

TCP manages this by establishing a handshake mechanism (TCP three-way handshake) to set up the connection prior to transmitting data and properly terminating the connection once the communication session has completed.

Reference

'TCP/IP Illustrated, Volume 1: The Protocols' by W. Richard Stevens.

Postel, J., 'Transmission Control Protocol,' RFC 793.


Page:    1 / 14   
Total 75 questions