1. Choose any two of the following statements which are described as a discovery scan in Nmap.(Select 2answers)
A) It scans all 65,000+ possible network ports
B) It identifies software and versions running on open ports
C) It performs a simple ping test to determine if a host is up and alive on the network
D) It is an active scanning technique
2. What type of scan is the most helpful when Security Content Automation Protocol (SCAP) aware scanners, such as Tenable-s Nessus, test the execution of best-practice security configuration baselines from the Center for Internet Security (CIS)?
A) Stealth Scan
B) Compliance Scan
C) Discovery Scan
D) Full Scan
3. Select the general term that encompasses numerous types of control systems and equipment used for industrial process control.
A) SCADA
B) ICS
C) POS
D) None of the above
4. Following are the examples of a non-traditional asset, except ____________.
A) Linux Servers
B) IoT Devices
C) Real-time Operating Systems (RTOSs)
D) SCADA Networks
5. Following are issues to consider when performing a vulnerability scan, except ____________.
A) Bandwidth limitations
B) Services and protocols known to be in use in the environment
C) The public reputation of the developers of the software or operating system being tested
D) Overall topology of the network in question