Chapter 12 - Industrial and Enterprise Networking Flashcards

1
Q

3 unlicensed bands by the FCC

A

900Mhz, 2.4Ghz, 5Ghz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISM Bands

A

Industrial, scientific, and medial. 900Mhz, 2.4Ghz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

UNII Bands

A

Unlicensed National Information Infrastructure. 5GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Number of channels FCC released for the 2.4GHz band

A

14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Number of configurable channels in the 2.4GHz band

A

11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non overlapping channels in the 2.4GHz band

A

1,6,11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Max Data speeds for 802.11b

A

11mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data rate shifting

A

Ability to reduce transmission speeds without restarting a connection to accommodate for various distances from an AP. EXAMPLE: 1mbps when farthest. 11mbps when a little closer. All 802.11 WLAN technologies have this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Frequency and max speed of 802.11g

A

2.4GHz, 54mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Frequency and max speed of 802.11a

A

5Ghz, 54mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Frequency and max speed of 802.11b

A

2.4GHz, 11mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Frequency and max speed of 802.11n

A

2.4GHz or 5GHz, up to 250mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Although 802.11g devices operate on the same frequency as 802.11b devices, 801.11b devices can’t be software upgraded to 802.11g because

A

802.11g uses a different chipset to attain the 54mbps speeds at 2.4GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Although you can use 802.11b equipment in an 802.11g environment, what happens?

A

All clients must use the 802.12b modulation technique, DSSS. This is not as efficient and results in speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DSSS

A

Direct sequence spread spectrum. Modulation technique used by 802.11b devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OFDM

A

Orthogonal frequency division multiplexing. Modulation technique used by 802.11g devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How wide are each of the 14 channels in the 2.4Ghz range?

A

22MHz wide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Common devices that operate on (and interfere with) the 2.4Ghz bamd

A

Microwaves, cordless phones, Bluetooth devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Number of channels available to 802.11a devices, which operate on the 5Ghz band

A

12 non-overlapping channels at first. 11 more added in 2004

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DFS

A

Dynamic frequency selection. Feature of 802.11a that detects radar signals operating at the 5GHz band and marks that specific channel as unavailable to clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TPC

A

Transmit power control. Feature of 802.11a devices that allows for changing the power of transmission. Example: reducing to 5mW reduces transmission radius and improves performance for clients in I,mediate area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MIMO

A

Multiple input, multiple output. Feature of 802.11n that allows for multiple trams,otters and recovers to increase data throughout.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

802 standard that introduced DFS, TPC

A

802.11h

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Max antennae on an 802.11n device

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Year 802.11 ratified

A

1997

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Band for 802.11

A

2.4GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Number of channels for 802.11

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Data transmission rates of 802.11

A

1, 2 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Year 802.11a ratified

A

1999

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Band for 802.11a

A

5Ghz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Number of channels for 802.11a

A

Up to 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Data transmission rates of 802.11a

A

54mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Year 802.11b ratified

A

1999

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Band for 802.11b

A

2.4GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Number of channels for 802.11b

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Data transmission rates of 802.11b

A

11mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Year 802.11g ratified

A

2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Band for 802.11g

A

2.4Ghz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Number of channels for 802.11g

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Data transmission rates of 802.11g

A

54GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Year 802.11n ratified

A

2010

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Band for 802.11n

A

2.4GHz or 5GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Number of channels for 802.11n

A

Varies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Data transmission rates of 802.11n

A

100+ Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

2 installation types of all 802.11 WLAN stamdards

A

Ad hoc and infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Ad hoc wlan network

A

No access point. PCs connect directly to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Downsides of ad hoc wlan

A

Doesn’t scale well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

BSS / BSA

A

Basic service set or basic service area. Describes the services provided to clients connected to an Ap in infrastructure mode, in a defined area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Distribution system

A

Connection from the AP to the wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

SSID

A

Security Set Identifier. 32 character Id that refers to a wireless network and defines its BSS

51
Q

ESS

A

Extended service set. When two or more APs use the same SSID on different channels, with overlapping BSA of 10% or more. This allows clients to roam in the same network from one AP to another.

52
Q

Factors that affect signal strenth

A

Distance, barriers, protocols used, interference

53
Q

RADIUS

A

Security protocol that manages authorization, central access, accounting supervision. Users connect to the network by being authenticated by the radius server

54
Q

What is the maximum data rate of IEEE 802.11b?

A

11Mbps

55
Q

What is the maximum data rate of IEEE 802.11g?

A

54Mbps

56
Q

What is the maximum data rate of IEEE 802.11a?

A

54Mbps

57
Q

What is the frequency range of IEEE 802.11b?

A

2.4GHz

58
Q

What is the frequency range of IEEE 802.11g?

A

2.4GHz

59
Q

What is the frequency range of IEEE 802.11a?

A

5GHz

60
Q

APs come set up with what type of security enabled by default?

A

None

61
Q

Why would we use WPA instead of basic WEP?

A

Values of WPA keys can change dynamically while the system is being used. Also WEP sucks.

62
Q

Which IEEE committee has been sanctioned by WPA and is called WPA2?

A

IEE 802.11i standard

63
Q

The IEEE 802.11b/g basic standard has how many non-overlapping channels?

A

Three

64
Q

The first step in asset management is to inventory all the components on the network.​
(A) True
(B) False

A

Answer : (A)

65
Q

Cipher locks are not designed for physical security, such as on an outside door.
(A) True
(B) False

A

Answer : (A)

66
Q

Any device in an ICS that is motorized and can control the physical system is called a fieldbus.
(A) True
(B) False

A

Answer : (B)

67
Q

Every security policy should include a response policy, which specifically defines the characteristics of an event that qualifies as a formal incident and the steps that should be followed as a result.
(A) True
(B) False

A

Answer : (A)

68
Q

The first step of a response policy should be to secure the area.​
(A) True
(B) False

A

Answer : (B)

69
Q

A ______________ is an enclosure made of a conductive material that is designed to block electromagnetic signals, including Wi-Fi.​

A

Answer : Faraday cage

70
Q

A _____________ is a small network that is segmented from the rest of the network, and contains computers, called test beds.​

A

Answer : testing lab

71
Q

Microsoft sometimes releases a major group of patches to Windows or a Microsoft application, which it calls a __________________.

A

Answer : service pack

72
Q

The goal of a disaster recovery plan is to ensure ______________.​

A

Answer : business continuity

73
Q

________________ is a process of investigating deeper data on a computer and will essentially autopsy the computer to discover hidden data, such as deleted files and file fragments, and who has accessed that data and when.

A

Answer : Computer forensics

74
Q
An active card, which contains an internal battery, can provide a usable range of up to what distance? 
(A) ​100 m 
(B) ​150 m
(C) ​200 m
(D) ​250 m
A

Answer : (B)

75
Q
What type of software is a correction, improvement, or enhancement to a piece of software?​ 
(A) ​patch 
(B) ​upgrade
(C) ​rollback 
(D) ​kludge
A

Answer : (A)

76
Q
​In computer forensics, hidden data such as deleted files and file fragments are known as what term? 
(A) ​ambient data 
(B) ​transient data 
(C) ​tombstone data 
D) ​low level data
A

Answer : (A)

77
Q
Which team role is the person on call who first notices or is alerted to a problem?​ 
(A) ​manager 
(B) ​dispatcher 
(C) ​technical support specialist 
(D) ​public relations specialist
A

Answer : (B)

78
Q
What team member role coordinates the resources necessary to solve a problem?​ 
(A) ​dispatcher 
(B) ​manager 
(C) ​technical support specialist 
(D) ​public relations specialist
A

Answer : (B)

79
Q
What team member role focuses on only one thing: solving the problem as quickly as possible?​ 
(A) ​dispatcher 
(B) ​manager 
(C) ​technical support specialist
(D) ​public relations specialist
A

Answer : (C)

80
Q
What team member role, if necessary, learns about the situation and the response and then acts as official spokesperson for the organization to the public or other interested parties?​ 
(A) ​dispatcher 
(B) ​manager 
(C) ​technical support specialist 
(D) ​public relations specialist
A

Answer : (D)

81
Q

Which of the following is NOT a step that should be taken as part of a ​response policy?
(A) ​Secure the area and disconnect devices from the network
(B) ​Create documentation detailing the scene
(C) ​Attempt to access files to determine if they are compromised
(D) ​Protect the chain of custody of evidence

A

Answer : (C)

82
Q

What should be the first step of a response policy?​
(A) ​Determine if escalation is necessary
(B) ​Secure the area
(C) ​Document the scene
(D) ​Monitor evidence and data collection )

A

Answer : (A

83
Q
At what type of recovery site would computers, devices, and connectivity necessary to rebuilt a network exist, and all are appropriately configured, updated, and connected to match your network's current state?​
 (A) ​cold site 
(B) ​warm site 
C) ​temp site
(D) ​hot site
A

Answer : (D)

84
Q
Which type of recovery site is a place where computers, devices, and connectivity necessary to rebuild a network exist, with some pieces ​appropriately configured, updated, or connected? 
(A) ​cold site 
(B) ​warm site 
(C) ​hot site 
(D) ​temp site
A

Answer : (B)

85
Q
Which type of disaster recovery site is a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected? 
(A) ​cold site 
(B) ​temp site 
(C) ​warm site 
(D) ​hot site
A

Answer : (A)

86
Q
What type of physical security solution involves a device that scans an individual's unique physical characteristics?​ 
(A) ​proximity access 
(B) ​biorecognition access 
(C) ​AIT access 
(D) ​keypad access
A

Answer : (B)

87
Q
The time period in which a change can be implemented is known as what option below?​ 
(A) ​change period 
(B) ​maintenance window
(C) ​work order time
 (D) ​service affecting work interval
A

Answer : (B)

88
Q
In order to provide access to a historian by personnel working on the corporate network that are not authorized to work on the ICS network, where should the historian be placed?​ 
(A) ​DMZ 
(B) corporate network 
(C) ​Internet
 (D) ​private network
A

Answer : (A)

89
Q

What is a historian?​
(A) ​A centralized database of collected and analyzed data and control activities.
(B) ​A server that collects and stores raw data.
(C) ​A supervisory computer or server, which can control the physical system.
(D) ​Computers, including hardware and software, that people use to monitor and manage the physical systems.

A

Answer : (A)

90
Q
What type of device can be used to erase contents of a hard drive using a magnetic field?​ 
(A) ​electromagnetic resonance chamber 
(B) ​degausser
(C) ​targeted magneto-wipe 
(D) ​polarized magnet Answer : (B)
A

Answer : (B)

91
Q

If a destructive program is running that might be destroying evidence, what should be done?​
(A) ​Perform an immediate full backup
(B) ​Attempt to end the process
(C) ​Pull the power cable
D) ​Record the destruction using a video capture of the screen

A

Answer : (C)

92
Q
Upon receipt of what type of notification is a company required to activate a defensible policy for the preservation of relevant data?​ 
(A) subpoena 
(B) ​legal hold 
(C) ​discovery request 
(D) ​chain of custody notice
A

Answer : (B)

93
Q

Which of the following is responsible for acquiring real-time data from the physical system and managing the physical system or presenting the data to humans?

a. RTU
b. PLC
c. SCADA
d. HMI

A

Answer: C

94
Q

The ________ is a centralized database of collected and analyzed data and control activities.

A

Answer: historian

95
Q

True or False: It is considered best practice to segment your ICS/SCADA network from the corporate network.

A

Answer: True

96
Q

Which of the following is an enclosure made of a conductive material that is designed to block electromagnetic signals, including Wi-Fi?

a. human machine interface
b. Faraday cage
c. closed loop system
d. programmable logic controller

A

Answer: B

97
Q

The first step in asset management is to determine the cost and benefits of certain types of hardware and software.

A

Answer: False

98
Q

Which of the following terms best describe a major change to a software package that enhances the functionality and features of the software, while also correcting bugs and vulnerabilities?

a. service pack
b. rollback
c. backlevel
d. upgrade

A

Answer: D

99
Q

After a major change is approved, a _______ is usually assigned to the project.

A

Answer: change coordinator

100
Q

Which of the following collect power from a badge reader’s power field in order to transmit data? a. passive cards b. fingerprint scanner c. active cards d. mantraps

A

Answer: A

101
Q

True or False. A cold site is a place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match a network’s current state.

A

Answer: False

102
Q

A _____ plan accounts for the worst-case scenarios, from a far-reaching hurricane to a military or terrorist attack. a. continuity b. contingency c. disaster recovery d. survivability

A

Answer: C

103
Q

Which ICS component senses attributes of the physical system and converts analog data to
digital data, but cannot control the physical system?
A. SCADA
B. RTU
C. PLC
D. HMI

A

Answer: B. RTU

104
Q
Which server controls the physical system in an ICS system? 
A. Acquisitions server 
B. I/O server 
C. MTU 
D. Historian
A

Answer: C. MTU

105
Q
What should you place between the corporate network and the ICS network? 
A. VLAN 
B. Dial-up connection 
C. Redundant RTUs 
D. DMZ
A

Answer: D. DMZ

106
Q
Which business document fills the gap between an informal handshake and the legally 
binding signatures on contracts? 
A. SLA 
B. SOW 
C. MOU 
D. RFP
A

Answer: C. MOU

107
Q

Your company has developed a Web site that includes a small program that collects real-time
data on mortgage rates in specific geographic areas, and uses that information to calculate
mortgage payment amounts based on the user’s inputted data. The program was written by an
independent software developer, who has granted your company a license to incorporate the
program into your Web site for your customers’ use. Which document was used?
A. SLA
B. MLA
C. RFP
D. SOW

A

Answer: B. MLA

108
Q

Your team is in the process of implementing what you thought would be a relatively minor
update to the NOS. You’ve hit a small but time-consuming snag, and it’s now obvious that
the update won’t be completed until about an hour after your maintenance window passes.
What should you do immediately?
A. Consult the vendor documentation.
B. Roll back the update and try again later.
C. Bring the system back online and allow users to access any services that are available.
D. Inform technical staff and users of the problem and what to expect.

A

Answer: D. Inform technical staff and users of the problem and what to expect.

109
Q
Which of the following cards specifically contains an internal lithium battery? 
A. Smart card 
B. Active card 
C. Passive card 
D. Proximity card
A

Answer: B. Active card

110
Q
Which type of disaster recovery site is the most expensive? 
A. Hot site 
B. Ambient site 
C. Warm site 
D. Cold site
A

Answer: A. Hot site

111
Q
What process ensures that exact duplicates of servers are available if needed in the event of a 
disaster? 
A. Business continuity 
B. Server mirroring 
C. Network redundancy 
D. Contingency plan
A

Answer: B. Server mirroring

112
Q

While troubleshooting a network connection issue on a corporate workstation, you’ve just
discovered that the workstation has been used for illegal gambling activities. You’ve notified
your supervisor, and she said she’s on her way to collect the computer for an investigation.
While you’re waiting for your supervisor to arrive, what should you do?
A. Play games on the computer to pass the time.
B. Close all running programs.
C. Start investigating browser history.
D. On a separate device or on a sheet of paper, make notes on everything that you’ve seen
and done so far.

A

Answer: D. On a separate device or on a sheet of paper, make notes on everything that you’ve
seen and done so far. Answer: They use the Internet for connectivity

113
Q

Industrial systems become part of the IoT when ________________.

A

Answer: They use the Internet for connectivity.

114
Q

What is the primary difference between an open loop system and a closed loop system?

A

Answer: An open loop system has no sensors and makes decisions based on predetermined
expectations, events, or past history. A closed loop system makes decisions based on real-time
data.

115
Q

Which network components should be documented in asset management documentation?

A

Answer: Nodes or hardware devices on the network, and each software package purchased by
the organization

116
Q

A service pack is a collection of ____________________.

A

Answer: Patches

117
Q

What is the basic process for backleveling an operating system upgrade?

A

Answer: Prior to the upgrade, make a complete backup of the system; to backlevel, restore the
entire system from the backup; uninstall an operating system upgrade only as a last resort.

118
Q

How can a mantrap provide multifactor authentication?

A

Answer: A separate form of identification might be required for each door, such as a badge for
the first door and a fingerprint scan for the second door

119
Q

What kind of device erases the contents of a magnetic hard drive?

A

Answer: Degausser

120
Q

What kind of information can computer forensics recover that eDiscovery cannot?

A

Answer: Ambient data, such as deleted files and file fragments, and who has accessed that data
and when

121
Q

While upgrading a sales rep’s corporate desktop computer, you notice some HR files for
several coworkers from several different departments. You’re pretty sure the sales rep
shouldn’t have access to this information, so you call your supervisor for assistance. He says
he’s on his way. Should you shut down the computer? Why or why not?

A

Answer: No. There is no evidence of ongoing damage from a running program, so the computer
should remain powered up until your supervisor decides how to transport it.

122
Q

When your supervisor arrives, she has a document with her for you to sign, indicating the
condition of the computer, how you kept it secure while you waited for her, and the transfer
of responsibility for the computer from you to her. What kind of document is it?
Answer: Chain of custody

A

Answer: Chain of custody

123
Q

The first step in asset management is to inventory all the components on the network.​ (A) True (B) False

A

Answer : (A)