The vulnerability that led to the WannaCry ransomware infections affected which protocol?
Which publication from NIST provides guidance on Industrial Control Systems?
Which of the ICS/SCADA generations is considered distributed?
Which of the following is a weakness of a vulnerability scanner?
What is a vulnerability called that is released before a patch comes out?
Which of the IPsec headers contains the Security Parameters Index (SPI)?
How many IPsec rules are there in Microsoft Firewall configuration?
What type of protocol is represented by the number 6?
Which of the following is the stance that by default has a default deny approach?
Which of the ICS/SCADA generations is considered monolithic?
Which mode within IPsec provides secure connection between two endpoints but does NOT protect the sender and the receiver?
Who developed the ModBus protocol?
Which of the following is considered the best way to counter packet monitoring for a switch?
Which component of the IT Security Model is attacked with interruption?
When monitoring a network, you receive an ICMP type 8 packet. What does this represent?
Which of the following is known as a prebuilt directional gateway that is unidirectional?
What is the maximum size in bytes of an ethernet packet?
What type of protocol is considered connection-oriented?
Which of the following is NOT an exploit tool?
Which component of the IT Security Model is the highest priority in ICS/SCADA Security?
Which of the following names represents inbound filtering?