Common QA Flashcards
What is the primary function of a firewall?
a. Block all internet traffic
b. Detect network intrusions
c. Filter network traffic
d. Authenticate users
c. Filter network traffic
Inter-network connection device that restricts data communication traffic between two connected networks is called a(n) . a. IDS b. Firewall c. Router d. Anti-virus software
b. Firewall
The process of securing a system by reducing its attack surface is known as
a. Threat Modeling
b. System Hardening
c. Intrusion Detection
d. Whitelisting
b. System Hardening
Policies, procedures and technical controls that govern the use of system resources are known as a. Data Flow Controls b. System Integrity Controls c. Access Controls d. System Hardening Controls
c. Access Controls
Which of the following is an objective of cybersecurity acceptance testing?
a. Verification of cybersecurity specifications
b. Root cause analysis
c. Cyber risk determination
d. Verification of system functionality
a. Verification of cybersecurity specifications
What are the three main phases of the IACS Cybersecurity Lifecycle?
a. Assess, Develop & Mitigate, Maintain
b. Design, Implement, Maintain
c. Assess, Develop & Implement, Maintain
d. Design, Mitigate, Maintain
c. Assess, Develop & Implement, Maintain
Which of the following is the correct risk equation?
a. Risk = Threat x Asset x Consequence
b. Risk = Threat x Vulnerability x Cost
c. Risk = Threat Agent x Threat x Vulnerability
d. Risk = Threat x Vulnerability x Consequence
d. Risk = Threat x Vulnerability x Consequence
The desired level of security for a system is known as?
a. Target Security Level
b. Achieved Security Level
c. Capability Security Level
d. Protection Level
a. Target Security Level
Which of the following is the correct formula for Cyber Risk Reduction Factor (CRRF)?
a. CRRF = Unmitigated Risk / Tolerable Risk
b. CRRF = Mitigated Risk / Tolerable Risk
c. CRRF = Tolerable Risk / Unmitigated Risk
d. CRRF = Tolerable Risk / Mitigated Risk
a. CRRF = Unmitigated Risk / Tolerable Risk
An Intrusion Detection System (IDS) is an example of what method of treating risk?
a. Detect
b. Deter
c. Defend
d. Defeat
a. Detect
A security service system that monitors and analyzes system events for the purpose of
finding, and providing real-time or near real-time warning of attempts to access system
resources in an unauthorized manner is called a(n) .
a. IDS
b. Firewall
c. Router
d. Anti-virus software
a. IDS
What is the name of the firewall feature that analyzes protocols at the application
layer to identify malicious or malformed packets?
a. Stateful inspection
b. Deep packet inspection
c. Packet filter
d. Layer 3 check
B. Deep packet inspection
A three-tier network segmentation design that prevents direct communication between
the enterprise network and the process control network by creating a buffer is also
known as a(a) .
a. Zones and conduits
b. Perimeter firewall
c. ICS firewall
d. DMZ
d. DMZ
Which of the following represents the recommended process of firewall planning and
implementation?
a. Plan, Configure, Test, Deploy, Manage
b. Plan, Configure, Deploy, Test, Manage
c. Plan, Deploy, Manage, Test, Configure
d. Design, Configure, Test, Deploy, Document
a. Plan, Configure, Test, Deploy, Manage
What are the main types of intrusion detection systems?
a. Perimeter Intrusion Detection & Network Intrusion Detection
b. Host Intrusion Detection & Network Intrusion Detection
c. Host Intrusion Detection & Intrusion Prevention Systems
d. Intrusion Prevention & Network Intrusion Detection
b. Host Intrusion Detection & Network Intrusion Detection
What is the desired outcome of the Initiate a CSMS program activity?
a. Conceptual diagrams that show how an AD forest can be attacked
b. Obtain leadership commitment, support, and funding
c. Identify software agents used by threat agents to propagate attacks
d. Conduct periodic IACS conformance audits
b. Obtain leadership commitment, support, and funding
Which of the following is NOT a network device hardening best practice?
a. Install latest firmware updates
b. Shut down unused physical interfaces
c. Enable logging, collect logs (e.g. Syslog) and review regularly
d. Use Telnet for remote management
d. Use Telnet for remote management
Which of the following is an example of dual-factor authentication?
a. Username and password
b. Digital certificate and smart card
c. Fingerprint and retinal signature
d. Fingerprint and smart card
d. Fingerprint and smart card
A network that uses a public telecommunication infrastructure such as the Internet to
provide remote networks or computers with secure access to another network is known as
a(an) .
a. VLAN
b. VSAT
c. VPN
d. VNC
c. VPN
If a virus shuts down an industrial network by overloading the Ethernet switches
which basic information security property is affected?
a. Integrity
b. Confidentiality
c. Availability
d. Reliability
c. Availability
Which three basic properties are the building blocks of cyber security?
a) Authorization, Identification, and Integrity (AII)
b) Confidentiality, Integrity and Availability (CIA)
c) Authorization, Reliability and Integrity (ARI)
d) Confidentiality, Integrity and Authorization (CIA)
b) Confidentiality, Integrity and Availability (CIA)
What is the biggest security problem if business networks connect directly to industrial control
systems?
a) Too many business users requesting data will slow control system operation to a crawl,
endangering the security of processes.
b) Unauthorized business users, outsiders and malware can penetrate critical industrial control
systems and upset critical processes.
c) Production workers will change data in business systems given the opportunity
d) Cybersecurity insurance will increase in cost
b) Unauthorized business users, outsiders and malware can penetrate critical industrial control
systems and upset critical processes.
“Countermeasures” in cyber security are measures taken to:
a) Eliminate system penetration by outsiders
b) Confuse perimeter intrusion detectors
c) Reduce the system’s risk of loss from vulnerabilities and threats
d) Eliminate the risk of an inside attacker taking over a computer network
c) Reduce the system’s risk of loss from vulnerabilities and threats