You are on page 1of 5
1. Which of the following network attacks can KICS for Networks detect specifically with the help of embedded advanced detection technologies? © Pretoosing smurf Phishing mtu 2. Specify the typical ICS higher-level components. PLC vi SCADA Server eaewaep Hatin sone Engnerng workstation @ Alorteanove 3.Which format does KICS for Networks support for sending data to a SIEM system? vat asc Js0N Text Oo cm 4, At what levele (according to the ISA-95 medel) doee Kacpersky Industrial CyberSecurity provide protection for systems? ° 5. What data communication protocols are used by Kaspersky Security Gateway? Pertialy 2 @ coos oPc20 DA Telnet Allofthe above 6. What's the oldest desktop operating system that KICS for Nodes supports? Windowe Mitornium © wirdows vise Windowe XPProtesconal $2 Windows PEmbedded Windows CE6.0 7.To obtain a copy of network traffic, KICS for Networks connects to the industrial netwerk. Specify which port or connection methed is of no usein this case. SPAN Mirroring: @ mw WAN 8, Please specify which options are "NOT" available forthis purpose. \Via an internet prowser, using the IPadoress or the KICS for Networks server, ia a smartpnone app Via Kaspersky Security Center @ vesew Via the Process Control tab in the console 9. Which node roles are possible while KICS for Networksis being deployed? Fartally correct 4) Sener Sensor Serverand sensor on the seme node ‘Server and several sensors on the same noae Several sensors onthe same node Several servers onthe same node Allofthe above 10. Why de ules need tebe oreatedin the process controtab in KICS for Networks? © tienen Toprocess wate To process tgs To detectintrusors ‘I. Which type of low-level network attacks can KICS for Networks detect specifically with the help of embedded detection technologies? Fragmentoveriapping INVITE of Death War Driving s 12. The task’Protection from malicious encryption’ helps pretest files from cryptoware in: Syotem folders SCADAcystom folders Adrrinistratorfelder Public access folders © slortne boveroisers 13. Which KICS component ie reeponcible for ceanning software vulnerabil KICS forNetworks S for Nodes KICS For Workstations 14, Which type of low-level network attacks can KICS for Networks detect specifically with the help of embedded advanced detection technologies? @ seamen overapnine TOP SYN Fioog Lano Slowloris 15. Which KICS component is the most convenient for ensuring integrity control for an rary file ona hard dri kaspersky Securty Center © respersiy secur KICS for Networks Kies forNedes 16, Which type of low-level network attacks can KICS for Networks detect specifically with the help of embedded other detection methods? GPS spoofing Referer spoofing DNS spoofing ARP spoofing lleiD Spoofing 7. When configuring the automatic rule generator for application launch control you can tick the boxes next to four file categories. Which category is "NOT" available when ‘configuring the rule generator? Scrints EXE files Battles MSifies DLLfiles 18, Which Kaspersky Lab utility collects diagnostic infermation from the computer where KICS for Nodes is installed? @ casysceminto chose Evertnur GetlogData 19. Whioh etatement ie the leact aveurate? Kaspersky industrial CyberSscurity for Networks ie atool for monitoring the trafficin an industriel network 9 protecting higher-level an @ _(Ss0etsty nsueeral Oypersecunty or Noesisa too lower-level ICS components Kaspersky Security Centers tool tor managing and administrating the information security system Kaspersty Security Gatoway is gateway for integrating an information sacurity system with @SIEM system 20. The KICS for Networks distribution kit contains @ number of installation packages with which extension? deb yum, spm

You might also like