FSCA Flashcards
ICS stands for ____________ Control System
Industrial
Which of the following is an inaccurate statement regarding ICS?
a) It may span across multiple countries
b) It may be confined to just a single factory
c) Its a system that manages industrial processes
d) There are two types of ICS architectures
e) Its used to control windows domain services
e) It’s used to control windows domain services
SCADA stands for ‘Supervisory Control and _______ Acquisition’
Data
DCS stands for _____________ Control System
Distributed
Which of the following are characteristics of a DCS architecture? Select three.
a) Field controllers simply acquire and pass along data.
b) Primarily used in single factories
c) Uses open protocols
d) Uses control loops to manage processes
e) Used in large geographical areas
f) Most control functions take place by the field controllers
b) Primarily used in single factories
d) Uses control loops to manage processes
f) Most control functions take place by the field controllers
True or False: Since they were developed many years ago, ICS protocols have been modified to include security features.
False
True of False: It’s unlikely to have a DCS architecture that uses multiple different ICS protocols
True
Which of the following are examples of ICS protocols used in SCADA architectures? Select three.
a) IEC104
b) DNP3
c) IEC61850
d) RS232
e) Delta
a) IEC104
b) DNP3
c) IEC61850
True or False: The main purpose of the Purdue reference model is to make it easier for different devices to communicate.
False
PLC stands for Programmable _________ Controller
Logic
Which Purdue level is responsible for supervising, monitoring and controlling manufacturing processes?
a) Purdue level 0
b) Purdue level 1
c) Purdue level 2
d) Purdue level 3
e) Purdue level 4
c) Purdue level 2
Which devices would you find in Purdue level 1? Select two.
a) RTUs
b) SCADA servers
c) PLCs
d) HMIs
e) Historian
f) SIEM
a) RTUs
c) PLCs
OT stands for ____________ Technology
Operational
Which of the following are characteristics of an IT environment? Select three.
a) Control, availability, and integrity are the most important
b) There are not typically a lot of a new devices added
c) New devices and applications are added without IT approval
d) They’re engineered to have long-lasting processes
e) Throughput and confidentiality are the most important
f) They typically contain many types of devices and applications
c) New devices and applications are added without IT approval
e) Throughput and confidentiality are the most important
f) They typically contain many types of devices and applications
True or False: In the past, for OT environments, physical security was the number one security concern.
True
True or False: Due to new standards, all of today’s OT environments have become connected to their organization’s IT networks.
False
Which of the following are characteristics of an OT environment: Select three:
a) New devices and applications are added without IT approval
b) They typically contain many types of devices and applications
c) They’re engineered to have long-lasting processes
d) Throughput and confidentiality are the most important
e) Control, availability, and integrity are the most important
f) There are not typically a lot of new devices added
c) They’re engineered to have long-lasting processes
e) Control, availability, and integrity are the most important
f) There are not typically a lot of new devices added
Which of the following is NOT a benefit of the convergence of IT and OT environments:
a) An administrator can control the PLC devices of all locations from a single place
b) An administrator can provide network assessments from home
c) An administrator can view processes of a satellite plant
d) An administrator can view security assessments on the road
e) A SCADA server can run on a windows server
e) A SCADA server can run on a windows server
True or False: One of the critical factors of OT environments is that they have no downtime.
True
Which of the following is a downside of the convergence of IT and OT environments?
a) It’s easier for administrators to manage manufacturing processes locally
b) Organizations require more field devices and field controllers
c) Administrators do not need to travel as much
d) It widens the attack surface for the OT environment
e) Administrators have less control of the overall processes
d) It widens the attack surface for the OT environment
True or False: Distributed intelligence happens on the command center, and centralized management happens on the enterprise command center.
False
Which of the following are characteristics of an active sensor? Select three.
a) They send traffic details to the enterprise command center
b) They use queries that are configured on the command center
c) They are required for eyeInspect deployments
d) They can obtain Windows update details
e) They do not add an additional network traffic
f) They add additional network traffic
b) They use queries that are configured on the command center
d) They can obtain Windows update details
f) They add additional network traffic
What is the benefit of using an enterprise command center?
a) They can retrieve data from both active and passive sensors
b) They can connect to more than 50 passive sensors
c) They enable communications over wide-area networks
d) They display data from multiple command centers
e) They provide license and software version control
d) They display data from multiple command centers
Which of the following can be used to access and eyeInspect command center? Select two:
a) http://<IP_address>
b) https://<IP_address>
c) http://<host_name>
d) https://<host_name>
e) ftp://<host_name></host_name></host_name></host_name></IP_address></IP_address>
b) https://<IP_address>
d) https://<host_name></host_name></IP_address>
What is the default username and password for a newly installed eyeInspect command center?
admin/admin
True or False: You must install a software license on the command center before you can add a passive sensor.
True
What detail is not displayed about a software license upon uploading it to the command center?
a) Expiration date
b) Maximum number of assets
c) Maximum number of connected sensors
d) Installation date
e) License level
d) Installation date
Which of the following are menus in an eyeInspect command center? Select four:
a) Events
b) Reports
c) Sensors
d) Configuration
e) Assets
f) Home
a) Events
c) Sensors
e) Assets
f) Home
What is the default port when adding a new passive sensor running v5.0 or prior?
a) 1000
b) 7676
c) 10640
d) 9999
e) 1234
d) 9999
True or False: It’s recommended to change the default port when adding a new sensor?
False
What is the monitoring status of a newly added sensor?
a) Open
b) Needs configuration
c) Licensed
d) Active
e) Connected
e) Connected
What are the possible State options for sensor detection modules? Select four:
a) Error
b) Detecting
c) Learning
d) Active
e) Alerting
f) Paused
b) Detecting
c) Learning
d) Active
f) Paused
True or False: For best communication between the command center and connected sensors, it’s recommended to manually set the date and time on both systems.
False
Which built-module would identify when an attacker attempts to identify which services are running on a device?
a) Frequent even aggregation
b) Malformed packed detection
c) Event logging
d) Visual analytics
e) Portscan detection
f) Man-in-the-Middle detection
e) Portscan detection
Which built-in module would identify when an attacker attempts to alter communication between two hosts?
a) Frequent event aggregation
b) Event logging
c) Portscan detection
d) Visual Analytics
e) Man-in-the-middle detection
f) Malformed packet detection
e) Man-in-the-middle detection
Which built-in module would identify when an attacker attempts to add an extra parameter to a communication?
a) Frequent event aggregation
b) Event logging
c) Portscan Detection
d) Visual analytics
e) Man-in-the-middle detection
f) Malformed packet detection
f) Malformed packet detection
True or False: Each eyeInspect user maintains their own Network Analytics page with custom widgets and tabs.
True
True or False: The visual analytics engine enables users to see network behavior in real-time.
True
What is a widget?
a) A backup and restore process
b) a toggle button
c) A method for sending network data
d) A license file
e) A chart
e) A chart
True or False: It’s important to consider disabling the visual analytics engine as it causes sensors to send flow information in full data format.
False
By default, how long is visual analytics data stored on the command center?
a) Data is not stored on the command center
b) 24 hours
c) 2 weeks
d) 1 month
e) 3 months
e) 3 months
Once the visual analytics engine is active, what does the sensor send to the command center?
a) Traffic patterns
b) Flow information
c) Network Logs
d) Alerts
e) Asset details
b) Flow information
True or False: You can disable parts of the visual analytics engine to conserve network bandwidth.
True
What does eyeInspect do if it doesn’t recognize the protocol being used?
a) It ignores the traffic
b) It labels it using ‘TCP’ or ‘UDP’ and the port number
c) It requests a port-to-name mapping
d) It labels it as ‘Unknown’
e) It labels it as ‘NotAKnown One’
e) It labels it as ‘NotAKnown One’
Which of the following are widget datasources? Select four:
a) Authentication Events
b) Assets
c) Flow Information
d) Sensors
e) Logged Events
f) Alerts
b) Assets
c) Flow Information
e) Logged Events
f) Alerts
Which of the following are widget types? Select four:
a) Histogram
b) Pie
c) Scatter
d) Column
e) Sunburst
f) Chord
a) Histogram
b) Pie
e) Sunburst
f) Chord
Which of the following are widget dimensions? Select four:
a) Source MAC
b) L2 Protocol
c) Destination IP
d) Connections
e) Sensor Name
f) Bytes
a) Source MAC
b) L2 Protocol
c) Destination IP
e) Sensor Name
True or False: When you create a new tab using a template, the resulting tab layout cannot be modified.
False
True or False: When you apply a filter to a tab, you can also apply an additional filter to one of the widgets on the tab.
True
True or False: Information learned by active sensors is added to the Assets page.
True
Which of the following asset details are discovered by eyeInspect passive sensors?
a) Firmware version
b) MAC address
c) Model
d) Vendor
e) Purdue Level
f) Role
a) Firmware version
b) MAC address
c) Model
d) Vendor
e) Purdue Level
f) Role
Which of the following are widgets on the assets page? Select four:
a) Vulnerability instances per severity
b) Assets per Purdue level
c) Assets per risk
d) Assets per role
e) Top Protocols
f) Throughput per protocol
a) Vulnerability instances per severity
b) Assets per Purdue level
c) Assets per risk
e) Top Protocols
True or False: You can add custom widgets on the Assets page
False
What is the default grouping of the assets on the Map view?
a) By risk
b) By criticality
c) By role
d) By purdue level
e) By network
c) By role
What is the default layout for assets on the Map view?
a) Purdue levels
b) Communications
c) Risks
d) Roles
e) Networks
a) Purdue Levels
What information can you see about an asset when you mouse over it on the map?
a) It’s risk
b) Which assets it communicates with
c) Its hostname
d) Its MAC address
e) It’s vendor
f) It’s criticality
a) It’s risk
b) Which assets it communicates with
c) Its hostname
d) Its MAC address
By default, how often are the overall risk levels evaluated?
a) Never
b) Every minute
c) Every 30 seconds
d) Every hour
e) Every 12 hours
d) Every hour
Which alert details can be modified? Select three:
a) Event type
b) Severity
c) Tactic
d) Status
e) Detection Engine
f) Case
b) Severity
d) Status
f) Case
How does eyeInspect cluster assets together?
a) By communication only
b) By role only
c) By network only
d) By role and communications
e) By role and network
d) By role and communications