Chapter 10 Security Considerations for Specific Sectors and Operational Technologies Flashcards
Which regulated business sector is intended to benefit citizens and generate no commercial profit?
A. Energy
B. Manufacturing
C. Healthcare
D. Public services
D. Public services
Which regulated business sector would typically involve the processing and storage of PHI?
A. Energy
B. Manufacturing
C. Healthcare
D. Public utilities
C. Healthcare
Which regulated business sector may be targeted by competitors who want to steal a company’s IP?
A. Energy
B. Manufacturing
C. Healthcare
D. Public Utilities
B. Manufacturing
What type of network would likely include legacy vulnerable components?
A. SCADA
B. Zigbee
C. IoT
D. LAN
A. SCADA
What risk mitigation would be used when supporting SCADA and business networks for an energy provider?
A. Segment vulnerable systems
B. VLANs
C. Deploy to the DMZ
D. Upgrade all systems
A. Segment vulnerable systems
What is a type of processor chip that performs a dedicated task and may be used for bitcoin mining?
A. IoT
B. SoC
C. ASIC
D. FPGA
C. ASIC
What is a specialist hardened computer that will control actuators, valves, and pumps in an industrial environment?
A. Desktop computer
B. PLC
C. Mainframe computer
D. Sensor
B. PLC
What is a type of processor chip that can be reprogrammed in the field?
A. IoT
B. SoC
C. ASIC
D. FPGA
D. FPGA
This term covers many technologies including home automation, building control systems and many other area where automation hardware is required
A. IoT
B. SoC
C. ASIC
D. FPGA
A. IoT
What is the database logging system known as that will collect data from process controls such as sensors, instrumentation and other types of controls?
A. Historian
B. Ladder Logic
C. SIS
D. HVAC
A. Historian
This is a simple programming language based upon relay based logic, used originally in electromechanical relays
A. Historian
B. Ladder Logic
C. Zigbee
D. Modbus
B. Ladder Logic
What is the de facto standard message transport protocol used in industrial environments that offers no security against tampering with message integrity and is therefore vulnerable to MiTM attacks?
A. CAN
B. Modbus
C. DNP3
D. Zigbee
B. Modbus
What is the networking middleware known as a pub-sub model that is aimed at publishing messages to subscribers?
A. CAN
B. DDS
C. DNP3
D. Zigbee
B. DDS
Which wireless protocol intended primarily for home automation allows communication with low power devices over distances varying between 10 and 100 meters?
A. CAN
B. CIP
C. DNP3
D. Zigbee
D. Zigbee
What is a protocol used for the transmission of messages on industrial networks? There are four types of networks offering different transport and network models, including 802.3 Ethernet
A. CAN
B. CIP
C. DNP3
D. Zigbee
B. CIP