All Exams
Login
Home
Exams
ECCouncil
ICS-SCADA
Question 6 of 75
What step of the malware infection installs the malware on the target?
A.
Drive-by
B.
Init
C.
Dropper
D.
Stager
Answer
Discussion
Correct Answer: C
Question 7 of 75
The vulnerability that led to the WannaCry ransomware infections affected which protocol?
A.
Samba
B.
None of these
C.
RPC
D.
SMB
Answer
Discussion
Correct Answer: D
Question 8 of 75
Which of the registrars contains the information for the domain owners in Europe?
A.
RIPENCC
B.
AFRINIC
C.
LACNIC
D.
ARIN
Answer
Discussion
Correct Answer: A
Question 9 of 75
Which component of the IT Security Model is attacked with interruption?
A.
Confidentiality
B.
Availability
C.
Authentication
D.
Integrity
Answer
Discussion
Correct Answer: B
Question 10 of 75
In what default directory (fully qualified path) does nmap store scripts?
A.
/usr/share/scripts
B.
/ust/share/nmap/scripts
C.
/usr/share/nmap
D.
/opt
Answer
Discussion
Correct Answer: C
Prev page
Prev
Next page
Next