Free ICS-SCADA Exam Braindumps (page: 3)

Page 2 of 19

Which of the following is NOT an exploit tool?

  1. Canvas
  2. Core Impact
  3. Metasploit
  4. Nessus

Answer(s): D

Explanation:

Among the options listed, Nessus is primarily a vulnerability assessment tool, not an exploit tool. It is used to scan systems, networks, and applications to identify vulnerabilities but does not exploit them. On the other hand, Canvas, Core Impact, and Metasploit are exploit tools designed to actually perform attacks (safely and legally) to demonstrate the impact of vulnerabilities.


Reference:

Tenable, Inc., "Nessus FAQs".



When monitoring a network, you receive an ICMP type 8 packet.
What does this represent?

  1. Echo request
  2. Echo start
  3. Echo recall
  4. Echo reply

Answer(s): A

Explanation:

ICMP (Internet Control Message Protocol) is used in network devices, like routers, to send error messages and operational information indicating success or failure when communicating with another IP address.
An ICMP type 8 packet specifically is an "Echo Request." It is used primarily by the ping command to test the connectivity between two nodes.
When a device sends an ICMP Echo Request, it expects to receive an ICMP Echo Reply (type 0) from the target node. This mechanism helps in diagnosing the state and reachability of a network on the Internet or within a private network.
Reference
RFC 792 Internet Control Message Protocol: https://tools.ietf.org/html/rfc792 Internet Assigned Numbers Authority (IANA) ICMP Parameters:



What step of the malware infection installs the malware on the target?

  1. Drive-by
  2. Init
  3. Dropper
  4. Stager

Answer(s): C

Explanation:

The term "Dropper" in cybersecurity refers to a small piece of software used in malware deployment that is designed to install or "drop" malware (like viruses, ransomware, spyware) onto the target system.
The Dropper itself is not typically malicious in behavior; however, it is used as a vehicle to install malware that will perform malicious activities without detection. During the infection process, the Dropper is usually the first executable that runs on a system. It then unpacks or downloads additional malicious components onto the system.
Reference
Common Malware Enumeration (CME): http://cme.mitre.org Microsoft Malware Protection Center: https://www.microsoft.com/en-us/wdsi



The vulnerability that led to the WannaCry ransomware infections affected which protocol?

  1. Samba
  2. None of these
  3. RPC
  4. SMB

Answer(s): D

Explanation:

WannaCry is a ransomware attack that spread rapidly across multiple computer networks in May 2017.
The vulnerability exploited by the WannaCry ransomware was in the Microsoft Windows implementation of the Server Message Block (SMB) protocol. Specifically, the exploit, known as EternalBlue, targeted a flaw in the SMBv1 protocol. This flaw allowed the ransomware to spread within corporate networks without any user interaction, making it one of the fastest-spreading and most harmful cyberattacks at the time.
Reference
Microsoft Security Bulletin MS17-010 - Critical: https://docs.microsoft.com/en-us/security- updates/SecurityBulletins/2017/ms17-010
National Vulnerability Database, CVE-2017-0144: https://nvd.nist.gov/vuln/detail/CVE-2017-0144






Post your Comments and Discuss EC-Council ICS-SCADA exam with other Community members:

ICS-SCADA Discussions & Posts