Midterm Flashcards

1
Q

When to disclose vulnerability

A

after patch released

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

where are borders for routable/non-routable networks?

A

demarcation of control and SCADA network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

are non routable networks vulnerable? Why?

A

Yes, non routable components often have uplinks to controller and/or have things like modems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ICS incorporates both ___ and ___ monitoring with some level of ___.

A

local, remote, centralized control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Industrial protocols Modbus/TCP, DNP3 operate at what layer?

A

Top layer (application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Serial and bus links using Modbus and DNP3 are examples of what?

A

non routable networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F industrial protocols can be made routable by placing them on the OSI stack

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zones and enclaves

A

used as method of network segregation, regquires logical boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

network perimeter

A

boundary of a zone, it is logical place to place security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

most attacks are ___ motivated, and occur ___, and use ___

A

financially, externally, weak or stolen credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

most incidents occur ____

A

internally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True / False: an attacker must have significant system knowledge of operational procedure in order to turn HMI access into an attack

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True/False: Industrial networks can be WAN or LAN

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

For CIA, what is most important for ICS?

A

A: availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network design of industrial networks optimizes ____.

A

real time usage (latency)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

APTs work via ____ while weaponized malware works ____

A

command and control, in isolation

17
Q

Attacker must know exact ____ in order to alter set point of industrial process

A

register

18
Q

business networks

A
  • highly interconnected
  • various wireless options
  • extremely dynamic
19
Q

Common topologies for ICs

A

RING and BUS (because of redundancy)

20
Q

Topology for end devices

A

star

21
Q

QOS (quality of service) definition

A

ability to differentiate and prioritize some traffic over other

22
Q

Domain servers and identity / access control systems should be ____________ for ICS and business networks

A

maintained separately (risk mitigation)

23
Q

Higher up the protocol stack you go, the higher the ____ due to ____.

A

latency, deeper packet inspection

24
Q

ICS should optimize network latency because operations are _____ and ______

A

time critical, deterministic

25
Q

QOS (quality of service) definition

A

ability to differentiate and prioritize some traffic over other

26
Q

Industrial wireless networks use what topology?

A

mesh

27
Q

is ICS network topology static or fixed?

A

fixed