Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is an output of a Business Impact Analysis?

A.

Determining the maximum time that systems can be offline

B.

Prioritizing the business's processes

C.

Calculating the financial impact of a technology failure

D.

Understanding all of the business's technology functions

At which offset of ~/GIAC/memdump/raw/key_13does binwalkindicate is the beginning of the binary file?

A.

0x2712

B.

0x33c1

C.

0x3400

D.

0x08el

E.

0x5df0

F.

0x5b66

G.

0x0000

What are the last four digits of the hash created when using openssl with the md5 digest on -/GlAC/film?

A.

c3d0

B.

054a

C.

f9d0

D.

a77f

E.

6157

F.

14f9

G.

3a46

What information can be found by dumping data at rest from a Purdue Enterprise Reference Architecture level 0/1 device?

A.

Firmware on read-protected chip

B.

Frequency-hopping algorithm that the RF chip will use

C.

Static cryptographic keys

Which of the following is a protocol that will provide control center-to-control center SCADA communications in a situation where each of the control centers implement a different vendor-supplied protocol internally?

A.

ICCP

B.

DNP3

C.

BACnet

D.

Modbus/TCP

E.

MMS

Which command can be used on a Linux system to search a file for a string of data and return the results to the screen?

A.

type

B.

cat

C.

grep

D.

tail

In the context of ICS the process of fuzzing a device is described as which of the following?

A.

Brute force password attacks against default accounts

B.

Launching all known exploits at the device in a randomized sequence

C.

Providing invalid, unexpected, or random data as inputs

D.

Monitoring device performance in varying power conditions

E.

Monitoring device performance in harsh environmental conditions

Which of the following is located in user mode of a typical realtime OS, but in kernel mode of a typical standard OS?

A.

Interprocess communication

B.

Virtual memory

C.

Device drivers

D.

Process scheduling

Which document should be updated to include incident handling while in the Planning phase of incident response?

A.

Disaster recovery plan

B.

Access control policy

C.

Backup policy

D.

Vulnerability report

A brewer uses a local HMI to communicate with a controller that opens a pump to move the workfrom the boil kettle to the fermentor. What level of the Purdue model would the controller be considered?

A.

Level 2

B.

Level 1

C.

Level 0

D.

Level 3

E.

Level 4