Free ICS-SCADA Exam Braindumps (page: 8)

Page 8 of 19

Which of the following steps is used to reveal the IP addressing?

  1. Footprinting
  2. Surveillance
  3. Cover your tracks
  4. Enumeration

Answer(s): D

Explanation:

Enumeration is a step in the information-gathering phase of a penetration test or cyber attack where an attacker actively engages with the target to extract detailed information, including IP addressing. Enumeration: During enumeration, the attacker interacts with network services to gather information such as user accounts, network shares, and IP addresses. Techniques: Common techniques include using tools like Nmap, Netcat, and Nessus to scan for open ports, services, and to identify the IP addresses in use. Purpose: The goal is to map the network's structure, find potential entry points, and understand the layout of the target environment.
Because enumeration involves discovering detailed information including IP addresses, it is the correct answer.
Reference
"Enumeration in Ethical Hacking," GeeksforGeeks, Enumeration. "Network Enumeration," Wikipedia, Network Enumeration.



Which of the following are not a part of the temporal score in the CVSS? (Select all that apply.)

  1. Attack Vector
  2. User Interaction
  3. Reporting Confidence
  4. Remediation Level

Answer(s): A,B

Explanation:

The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity. The temporal score in CVSS adjusts the base score of a vulnerability based on factors that change over time, such as the availability of exploits or the existence of patches.
The temporal score includes:
Remediation Level
Report Confidence
Attack Vector and User Interaction are part of the base score, not the temporal score, as they describe the fundamental characteristics of the vulnerability and do not typically change over time.
Reference
Common Vulnerability Scoring System v3.1: Specification Document. "Understanding CVSS," by FIRST (Forum of Incident Response and Security Teams).



Which of the registrars contains the information for the domain owners in Latin America?

  1. AFRINIC
  2. LACNIC
  3. RIPENCC
  4. ARIN

Answer(s): B

Explanation:

LACNIC, the Latin American and Caribbean Internet Addresses Registry, is the regional internet registry (RIR) responsible for allocating and administering IP addresses and Autonomous System Numbers (ASNs) in Latin America and the Caribbean.
Function: LACNIC manages the distribution of internet number resources (IP addresses and ASNs) in its region, maintaining the registry of domain owners and other related information. Coverage: The organization covers over 30 countries in Latin America and the Caribbean, including countries like Brazil, Argentina, Chile, and Mexico. Services: LACNIC provides a range of services including IP address allocation, ASN allocation, reverse DNS, and policy development for internet resource management in its region. Given this role, LACNIC is the correct answer for the registrar that contains information for domain owners in Latin America.

Reference
"About LACNIC," LACNIC, LACNIC Overview.
"Regional Internet Registries," Wikipedia, Regional Internet Registries.



Which of the following are valid TCP flags?

  1. None of these
  2. IGP,ACK,SYN,PSH,URG
  3. BGP,FIN,PSH,SYN,ACK
  4. FIN,PSH,URG,RST,SYN

Answer(s): D

Explanation:

TCP flags are used in the header of TCP segments to control the flow of data and to indicate the status of a connection. Valid TCP flags include:
FIN: Finish, used to terminate the connection.
PSH: Push, instructs the receiver to pass the data to the application immediately. URG: Urgent, indicates that the data contained in the segment should be processed urgently. RST: Reset, abruptly terminates the connection upon error or other conditions. SYN: Synchronize, used during the initial handshake to establish a connection. These flags are integral to managing the state and flow of TCP connections.


Reference:

Douglas E. Comer, "Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture".



Page 8 of 19



Post your Comments and Discuss EC-Council ICS-SCADA exam with other Community members:

Mostafa commented on August 23, 2024
This is a decent resource for preparing. But the free version is not enough and you need to buy the full PDF and the free test engine that comes with it is good.
Anonymous
upvote

John commented on July 30, 2024
How many total questions are available in dumps and that are sufficient to pass the exam?
Anonymous
upvote