1. Which of the following is not a valid PROFINET communication method?PROFINET RT UnicastPROFINET RT MulticastPROFINET Context ManagerPROFINET Data Link 2. Which of the following techniques is not a DoS attack type?Use of malfunctions and bugsFloodingAmplificationContent Security Policy (CSP) Bypass 3. What measure is the most effective to prevent a SMB Relay attack:Enforcing SMB SigningDisabling the local admin shares for SMBUsing only SMBv3Disabling NTLMv1 4. With asymmetric encryptionall communication participants use the same key pairall communication participants use an individual key pairthe advantage is that it provides better performance compared to symmetric encryptionit does not matter for security how the private keys are exchanged between the individual participants 5. Which of the following statements is true about honeypots?Anything going to a honeypot is likely a probe or attackHigh-interaction honeypots can handle a lot more traffic as low interaction honeypotsHoneypots need to be easy to distinguish from real systems to prevent accidental usageLogs of the honeypot should be only stored on the honeypot, to reduce the risk of exposing sensitive information 6. Which of the following tasks is not a hardening measure?Deactivate or remove unnecessary software and servicesRestrict access or deactivate unused interfacesAllocate pre-authorized network addressesDeactivate or remove unnecessary documents 7. Which of the following statements about keyloggers is wrong?Keyloggers only work on legacy Windows versions like XP as driver signing is preventing the installation in later versionsKeyloggers can be deployed as a hardware implantKeyloggers can be deployed as a software implantHardware keylogger can store keystrokes on a storage of the implant e.g. internal flash 8. What is MITRE ATT&CK for ICS?a tool for hacking PLCsis a knowledge base useful for describing the actions an adversary may take while operating within an ICS networkan IDS system which can detect most kind ICS adversariesa yearly security conference with a focus on ICS environment Time is Up!