Which of the ICS/SCADA generations is considered monolithic?

Which of the ICS/SCADA generations is considered monolithic?A . SecondB . FirstC . FourthD . ThirdView AnswerAnswer: B Explanation: The first generation of ICS/SCADA systems is considered monolithic, primarily characterized by standalone systems that had no external communications or connectivity with other systems. These systems were typically fully self-contained, with...

September 6, 2024No CommentsREAD MORE +

The NIST SP 800-53 defines how many management controls?

The NIST SP 800-53 defines how many management controls?A . 6B . 9C . 5D . 7View AnswerAnswer: B Explanation: NIST SP 800-53 is a publication that provides a catalog of security and privacy controls for federal information systems and organizations and promotes the development of secure and resilient federal...

September 3, 2024No CommentsREAD MORE +

What is the size in bytes of the TCP sequence number in the header?

What is the size in bytes of the TCP sequence number in the header?A . 2B . 1C . 3D . 4View AnswerAnswer: D Explanation: In the Transmission Control Protocol (TCP) header, the sequence number field is crucial for ensuring the correct sequencing of the packets sent over a network....

September 2, 2024No CommentsREAD MORE +

Which mode within IPsec provides a secure connection tunnel between two endpoints AND protects the sender and the receiver?

Which mode within IPsec provides a secure connection tunnel between two endpoints AND protects the sender and the receiver?A . ProtectedB . TunnelC . TransportD . CoveredView AnswerAnswer: B Explanation: IPsec (Internet Protocol Security) has two modes: Transport mode and Tunnel mode. Tunnel mode is used to create a secure...

September 1, 2024No CommentsREAD MORE +

What share does the WannaCry ransomware use to connect with the target?

What share does the WannaCry ransomware use to connect with the target?A . $IPCB . $AdminC . $SPOOLD . $CView AnswerAnswer: A Explanation: The WannaCry ransomware utilizes the $IPC (Inter-Process Communication) share to connect with and infect target machines. This hidden network share supports the operation of named pipes, which...

August 31, 2024No CommentsREAD MORE +