EC-Council ICS-SCADA Exam Questions
ICS/SCADA Cyber Security (Page 4 )

Updated On: 24-Feb-2026

When monitoring a network, you receive an ICMP type 8 packet.
What does this represent?

  1. Echo request
  2. Echo start
  3. Echo recall
  4. Echo reply

Answer(s): A

Explanation:

ICMP (Internet Control Message Protocol) is used in network devices, like routers, to send error messages and operational information indicating success or failure when communicating with another IP address.
An ICMP type 8 packet specifically is an "Echo Request." It is used primarily by the ping command to test the connectivity between two nodes.
When a device sends an ICMP Echo Request, it expects to receive an ICMP Echo Reply (type 0) from the target node. This mechanism helps in diagnosing the state and reachability of a network on the Internet or within a private network.
Reference
RFC 792 Internet Control Message Protocol: https://tools.ietf.org/html/rfc792 Internet Assigned Numbers Authority (IANA) ICMP Parameters:



What step of the malware infection installs the malware on the target?

  1. Drive-by
  2. Init
  3. Dropper
  4. Stager

Answer(s): C

Explanation:

The term "Dropper" in cybersecurity refers to a small piece of software used in malware deployment that is designed to install or "drop" malware (like viruses, ransomware, spyware) onto the target system.
The Dropper itself is not typically malicious in behavior; however, it is used as a vehicle to install malware that will perform malicious activities without detection. During the infection process, the Dropper is usually the first executable that runs on a system. It then unpacks or downloads additional malicious components onto the system.
Reference
Common Malware Enumeration (CME): http://cme.mitre.org Microsoft Malware Protection Center: https://www.microsoft.com/en-us/wdsi



The vulnerability that led to the WannaCry ransomware infections affected which protocol?

  1. Samba
  2. None of these
  3. RPC
  4. SMB

Answer(s): D

Explanation:

WannaCry is a ransomware attack that spread rapidly across multiple computer networks in May 2017.
The vulnerability exploited by the WannaCry ransomware was in the Microsoft Windows implementation of the Server Message Block (SMB) protocol. Specifically, the exploit, known as EternalBlue, targeted a flaw in the SMBv1 protocol. This flaw allowed the ransomware to spread within corporate networks without any user interaction, making it one of the fastest-spreading and most harmful cyberattacks at the time.
Reference
Microsoft Security Bulletin MS17-010 - Critical: https://docs.microsoft.com/en-us/security- updates/SecurityBulletins/2017/ms17-010
National Vulnerability Database, CVE-2017-0144: https://nvd.nist.gov/vuln/detail/CVE-2017-0144



Which of the registrars contains the information for the domain owners in Europe?

  1. RIPENCC
  2. AFRINIC
  3. LACNIC
  4. ARIN

Answer(s): A

Explanation:

RIPENCC (Réseaux IP Européens Network Coordination Centre) is one of the five Regional Internet Registries (RIRs) that allocate IP addresses and manage related resources within a specific region. Specifically, RIPENCC covers Europe, the Middle East, and parts of Central Asia. For domain owners, while the top-level domain (TLD) registrars handle domain registration, the information about IP allocations and related network infrastructure information in Europe is managed by RIPENCC.
Reference
RIPE Network Coordination Centre: https://www.ripe.net RIPE Documentation and Information: https://www.ripe.net/manage-ips-and-asns



Which component of the IT Security Model is attacked with interruption?

  1. Confidentiality
  2. Availability
  3. Authentication
  4. Integrity

Answer(s): B

Explanation:

The IT Security Model commonly refers to the CIA Triad, which stands for Confidentiality, Integrity, and Availability.
An attack on "Availability" is aimed at disrupting the normal functioning and access to data or resources in a network. This type of attack can include actions such as DDoS (Distributed Denial of Service), where overwhelming traffic is sent to a system to make it unresponsive. The main goal of attacks on availability is to prevent legitimate users from accessing systems or information, which can have significant implications for business operations and security.

Reference
Understanding the CIA Triad in Cybersecurity: https://www.cyber.gov.au/acsc/view-all- content/publications/cia-triad
Denial of Service ­ What it is and how to prevent it: https://www.us-cert.gov/ncas/tips/ST04-015






Post your Comments and Discuss EC-Council ICS-SCADA exam dumps with other Community members:

Join the ICS-SCADA Discussion