Which of the ICS/SCADA generations is considered monolithic?
Which of the ICS/SCADA generations is considered monolithic?A . SecondB . FirstC . FourthD . ThirdView AnswerAnswer: B Explanation: The first generation of ICS/SCADA systems is considered monolithic, primarily characterized by standalone systems that had no external communications or connectivity with other systems. These systems were typically fully self-contained, with...
The NIST SP 800-53 defines how many management controls?
The NIST SP 800-53 defines how many management controls?A . 6B . 9C . 5D . 7View AnswerAnswer: B Explanation: NIST SP 800-53 is a publication that provides a catalog of security and privacy controls for federal information systems and organizations and promotes the development of secure and resilient federal...
What is the size in bytes of the TCP sequence number in the header?
What is the size in bytes of the TCP sequence number in the header?A . 2B . 1C . 3D . 4View AnswerAnswer: D Explanation: In the Transmission Control Protocol (TCP) header, the sequence number field is crucial for ensuring the correct sequencing of the packets sent over a network....
Which mode within IPsec provides a secure connection tunnel between two endpoints AND protects the sender and the receiver?
Which mode within IPsec provides a secure connection tunnel between two endpoints AND protects the sender and the receiver?A . ProtectedB . TunnelC . TransportD . CoveredView AnswerAnswer: B Explanation: IPsec (Internet Protocol Security) has two modes: Transport mode and Tunnel mode. Tunnel mode is used to create a secure...
What share does the WannaCry ransomware use to connect with the target?
What share does the WannaCry ransomware use to connect with the target?A . $IPCB . $AdminC . $SPOOLD . $CView AnswerAnswer: A Explanation: The WannaCry ransomware utilizes the $IPC (Inter-Process Communication) share to connect with and infect target machines. This hidden network share supports the operation of named pipes, which...