Week 3 - Q's Flashcards

1
Q

What is the first step of the vulnerability management?

A. Monitoring network traffic.

B. Installing antivirus software.

C. Asset discovery and mapping.

D. Installing a firewall.

A

C. Asset discovery and mapping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why might Nmap (active scan) not be suitable for ICS/OT networks?

A. It’s too expensive.

B. It generates network traffic that can impact legacy ICS devices.

C. It could slow down the network and controlled process.

D. It is only suitable for Windows systems.

A

B. It generates network traffic that can impact legacy ICS devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of discovery is preferred in ICS environments?

A. Active discovery with lots of traffic.

B. Discovery using NMap.

C. Passive discovery.

D. No discovery at all.

A

C. Passive discovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is it essential for ethical hackers to conduct reconnaissance within legal and ethical bounds?

A. To gain unauthorized access.

B. Because reconnaissance is not important.

C. Unauthorized access or probing beyond publicly available information is illegal and unethical.

D. To use NMap indiscriminately.

A

C. Unauthorized access or probing beyond publicly available information is illegal and unethical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is your team expected to do before performing an active scan?

A. Request permission.

B. Make sure no other team is actively engaged with the system.

C. Signal our active engagement.

D. All of the above.

A

D. All of the above. (Request permission, make sure no other team is actively engaged with the system, and signal your active engagement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly