Midterm Flashcards

1
Q

When to disclose vulnerability

A

after patch released

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

where are borders for routable/non-routable networks?

A

demarcation of control and SCADA network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

are non routable networks vulnerable? Why?

A

Yes, non routable components often have uplinks to controller and/or have things like modems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ICS incorporates both ___ and ___ monitoring with some level of ___.

A

local, remote, centralized control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Industrial protocols Modbus/TCP, DNP3 operate at what layer?

A

Top layer (application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Serial and bus links using Modbus and DNP3 are examples of what?

A

non routable networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F industrial protocols can be made routable by placing them on the OSI stack

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zones and enclaves

A

used as method of network segregation, regquires logical boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

network perimeter

A

boundary of a zone, it is logical place to place security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

most attacks are ___ motivated, and occur ___, and use ___

A

financially, externally, weak or stolen credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

most incidents occur ____

A

internally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True / False: an attacker must have significant system knowledge of operational procedure in order to turn HMI access into an attack

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True/False: Industrial networks can be WAN or LAN

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

For CIA, what is most important for ICS?

A

A: availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network design of industrial networks optimizes ____.

A

real time usage (latency)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

APTs work via ____ while weaponized malware works ____

A

command and control, in isolation

17
Q

Attacker must know exact ____ in order to alter set point of industrial process

18
Q

business networks

A
  • highly interconnected
  • various wireless options
  • extremely dynamic
19
Q

Common topologies for ICs

A

RING and BUS (because of redundancy)

20
Q

Topology for end devices

21
Q

QOS (quality of service) definition

A

ability to differentiate and prioritize some traffic over other

22
Q

Domain servers and identity / access control systems should be ____________ for ICS and business networks

A

maintained separately (risk mitigation)

23
Q

Higher up the protocol stack you go, the higher the ____ due to ____.

A

latency, deeper packet inspection

24
Q

ICS should optimize network latency because operations are _____ and ______

A

time critical, deterministic

25
QOS (quality of service) definition
ability to differentiate and prioritize some traffic over other
26
Industrial wireless networks use what topology?
mesh
27
is ICS network topology static or fixed?
fixed