100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

SANS SEC401 EXAM STUDY GUIDE 2026/2027 COMPLETE QUESTIONS WITH VERIFIED CORRECT ANSWERS || 100% GUARANTEED PASS <NEWEST VERSION>

Puntuación
-
Vendido
-
Páginas
156
Grado
A+
Subido en
13-01-2026
Escrito en
2025/2026

SANS SEC401 EXAM STUDY GUIDE 2026/2027 COMPLETE QUESTIONS WITH VERIFIED CORRECT ANSWERS || 100% GUARANTEED PASS &lt;NEWEST VERSION&gt; 1. Industrial Control System (ICS) - ANSWER A device, or set of devices, that manages, commands, directs, or regulates the behavior of other devices or systems. 2. ICS technology drivers - ANSWER Reliability, efficiency, safety, and ease of use. 3. Discrete Process - ANSWER A process where a specified quantity of material moves as a unit between workstations and each unit maintains it's unique identity. 4. Batch Process - ANSWER A process that requires the mixing of raw materials, usually in a heated vessel. 5. Continuous Process - ANSWER A physical system that is represented through variables that are smooth an uninterrupted in time. 6. Hybrid Process - ANSWER reactive systems that intermix discrete and continuous processes 7. Process Engineer - ANSWER Designs the systems and processes used in the control environment. 8. Field Technician - ANSWER Maintains and repairs field devices 9. IPv6 Addressing - ANSWER Divided into 3 portions Network Prefix (48bits) - defines organization, Subnet ID (16bits) - Internal to organization, Interface ID (64bits) - Defined by MAC Address 10. Security Advice for IPv6 - ANSWER Disable IPv6 on workstations and servers; disable protocols not in use on all servers and workstations; analyze network traffic to discover miss-configured devices; From network enforcement zones deny unnecessary traffic and protocols. 11. ICMP - ANSWER Internet Control Message Protocol. Used for diagnostics such as ping. Many DoS attacks use ICMP. It is common to block ICMP at firewalls and routers. If ping fails, but other connectivity to a server succeeds, it indicates that ICMP is blocked. 12. UDP (User Datagram Protocol) - ANSWER connection-less protocol that does not require a connection to send a packet and does not guarantee that the packet arrives at its destination 13. TCP (Transmission Control Protocol) - ANSWER A connection-oriented, guaranteed-delivery protocol used to send data packets between computers over a network like the Internet. 14. DNP3 - ANSWER - DNP = Distributed Network Protocol - Mainly used by Electric, Gas and Water utilities - Originally developed by Westronic - Open standard - IEEE Standard - Up to 65,000 devices per network - Event time stamping - RS232, RS485 -- Can be encapsulated in TCP/IP or backhauled via radio and modem. - Master-slave protocol - but Slave can report without request - Master (HMI, FEP) to Slave (RTU, PLC, IED) communication - Functions include send request, accept response, confirmation, time outs, error recovery 15. Modbus TCP - ANSWER TCP/502 - Designed in the late 70s to provide simple and robust communications from master to slave devices. 16. Network Diagram - Conceptual Design - ANSWER HIgh-level Core components helps to understand a picture of the overall purpose of the network and why the solution was designed. Required for integration or general functionality, data flow, and high-level system behvior. Utilizes "black box" diagramming. 17. Network Diagram - Logical Design - ANSWER Reprsents each logical fuction in the system more detailed include dall the major components in teh network pu 18. What is Threat Enumeration? - ANSWER The process of tracking and understanding critical threats to your system or network. 19. Router attacks - ANSWER Denial of Service (DOS) Distributed Denial of Service (DDOS) Packet Sniffing Packet Misrouting Routing Table Poisoning Malicious Insider/Disgruntled Employee 20. What's a solution to a prevent a DOS? - ANSWER Patch the router. 21. Switch attacks - ANSWER DCP Manipulation MAC Flooding DHCP Spoofing STP Attacks VLAN Hopping Attack Telnet Attack 22. Which of the following is true regarding a TCP/IP packet being generated as it travels down the stack? (Book 1 Page 62) The packet directly connects to the peer layer on the target device. Each layer removes a header. Each layer adds a header. Each layer removes the previous header and adds its own. - ANSWER Each layer adds a header 23. What is a rough entry-level cost estimate of the hardware and software required for performing sniffing of wireless traffic? (Book 1 Page 185) US $5,000 US $2,000,000 US $50 US $20,000 - ANSWER $50

Mostrar más Leer menos
Institución
SANS SEC401
Grado
SANS SEC401











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
SANS SEC401
Grado
SANS SEC401

Información del documento

Subido en
13 de enero de 2026
Número de páginas
156
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

SANS SEC401 EXAM STUDY GUIDE
2026/2027 COMPLETE QUESTIONS WITH
VERIFIED CORRECT ANSWERS ||
100% GUARANTEED PASS
<NEWEST VERSION>


1. Industrial Control System (ICS) - ANSWER ✔ A device, or set of devices,
that manages, commands, directs, or regulates the behavior of other devices
or systems.


2. ICS technology drivers - ANSWER ✔ Reliability, efficiency, safety, and
ease of use.


3. Discrete Process - ANSWER ✔ A process where a specified quantity of
material moves as a unit between workstations and each unit maintains it's
unique identity.


4. Batch Process - ANSWER ✔ A process that requires the mixing of raw
materials, usually in a heated vessel.


5. Continuous Process - ANSWER ✔ A physical system that is represented
through variables that are smooth an uninterrupted in time.


6. Hybrid Process - ANSWER ✔ reactive systems that intermix discrete and
continuous processes

,7. Process Engineer - ANSWER ✔ Designs the systems and processes used in
the control environment.


8. Field Technician - ANSWER ✔ Maintains and repairs field devices


9. IPv6 Addressing - ANSWER ✔ Divided into 3 portions Network Prefix
(48bits) - defines organization, Subnet ID (16bits) - Internal to organization,
Interface ID (64bits) - Defined by MAC Address


10.Security Advice for IPv6 - ANSWER ✔ Disable IPv6 on workstations and
servers; disable protocols not in use on all servers and workstations; analyze
network traffic to discover miss-configured devices; From network
enforcement zones deny unnecessary traffic and protocols.


11.ICMP - ANSWER ✔ Internet Control Message Protocol. Used for
diagnostics such as ping. Many DoS attacks use ICMP. It is common to
block ICMP at firewalls and routers. If ping fails, but other connectivity to a
server succeeds, it indicates that ICMP is blocked.


12.UDP (User Datagram Protocol) - ANSWER ✔ connection-less protocol that
does not require a connection to send a packet and does not guarantee that
the packet arrives at its destination


13.TCP (Transmission Control Protocol) - ANSWER ✔ A connection-oriented,
guaranteed-delivery
protocol used to send data packets between computers over a network like
the Internet.


14.DNP3 - ANSWER ✔ - DNP = Distributed Network Protocol

, - Mainly used by Electric, Gas and Water utilities
- Originally developed by Westronic - Open standard
- IEEE 1815-2010 Standard
- Up to 65,000 devices per network
- Event time stamping
- RS232, RS485 -- Can be encapsulated in TCP/IP or backhauled via
radio and modem.
- Master-slave protocol - but Slave can report without request
- Master (HMI, FEP) to Slave (RTU, PLC, IED) communication
- Functions include send request, accept response, confirmation, time-
outs, error recovery


15.Modbus TCP - ANSWER ✔ TCP/502 - Designed in the late 70s to provide
simple and robust communications from master to slave devices.


16.Network Diagram - Conceptual Design - ANSWER ✔ HIgh-level
Core components
helps to understand a picture of the overall purpose of the network and why
the solution was designed.
Required for integration or general functionality, data flow, and high-level
system behvior.
Utilizes "black box" diagramming.


17.Network Diagram - Logical Design - ANSWER ✔ Reprsents each logical
fuction in the system
more detailed
include dall the major components in teh network pu


18.What is Threat Enumeration? - ANSWER ✔ The process of tracking and
understanding critical threats to your system or network.

, 19.Router attacks - ANSWER ✔ Denial of Service (DOS)
Distributed Denial of Service (DDOS)
Packet Sniffing
Packet Misrouting
Routing Table Poisoning
Malicious Insider/Disgruntled Employee


20.What's a solution to a prevent a DOS? - ANSWER ✔ Patch the router.


21.Switch attacks - ANSWER ✔ DCP Manipulation
MAC Flooding
DHCP Spoofing
STP Attacks
VLAN Hopping Attack
Telnet Attack


22.Which of the following is true regarding a TCP/IP packet being generated as
it travels down the stack? (Book 1 Page 62)


The packet directly connects to the peer layer on the target device.
Each layer removes a header.
Each layer adds a header.
Each layer removes the previous header and adds its own. - ANSWER ✔
Each layer adds a header


23.What is a rough entry-level cost estimate of the hardware and software
required for performing sniffing of wireless traffic? (Book 1 Page 185)


US $5,000
US $2,000,000
US $50
$15.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
ProfBenjamin Havard School
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
463
Miembro desde
1 año
Número de seguidores
14
Documentos
3194
Última venta
4 horas hace
EXCELLENT ACHIEVERS LIBRARY

As a professional tutor, I provide exceptional assistance with homework, quizzes, and exams across various subjects, including Psychology, Nursing, Biological Sciences, Business, Engineering, Human Resource Management, and Mathematics. I am dedicated to offering high-quality support and ensuring that all work meets scholarly standards. To enhance the effectiveness of our services, I work with a team of experienced tutors to create comprehensive and effective revision materials. Together, we are committed to helping students achieve excellent grades through our collaborative efforts and expertise.

Lee mas Leer menos
3.8

90 reseñas

5
41
4
12
3
25
2
5
1
7

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes