Multiple Choice - Big Flashcards

1
Q

What cryptographic-based solutions are presented for ensuring confidentiality in CPS communication channels?

A. Ultra-lightweight and low-latency block ciphers
B. Bump-in-the-wire (BITW)
C. Security Information and Event Management (SIEM)
D. Honeypots & Deception

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of Bump-in-the-wire (BITW) in CPS security, especially for legacy devices?

A. Adds integrity and authentication
B. Encrypts and provides message authentication
C. Monitors communication between the embedded controller and physical process
D. Secures the communication channel

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Trustworthy Autonomic Interface Guardian Architecture (TAIGA) used for in CPS security?

A. Ensures confidentiality
B. Monitors communication between the embedded controller and physical process
C. Provides real-time analysis of security alerts
D. Adds integrity and authentication

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of Shadow Security Unit (SSU) in CPS security for ensuring integrity?

A. Monitors communication channels
B. Adds watermark to the physical system
C. Secures SCADA.systems
D. Provides a last line of defense against cyber attacks

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does homomorphic encryption enhance communication confidentiality in CPS?

A. Encrypts and provides message authentication
B. Adds watermark to the physical system
C. Enables arithmetic operations on encrypted variables without decryption
D. Detects abnormal behavior in the network

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does an Intrusion Detection System (IDS) do in CPS security?

A. Monitors communication channels
B. Adds watermark to the physical system
C. Combines security information management and security event management
D. Enables arithmetic operations on encrypted variables without decryption

A

A&C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does Watermarking contribute to ensuring integrity in CPS?

A. Adds watermark to the physical system
B. Monitors communication channels
C. Secures SCADA.systems
D. Provides a last line of defense against cyber attacks

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the objective of a Honeypot in CPS security?

A. Monitors communication channels
B. Adds watermark to the physical system
C. Acts as a decoy to hide and protect the system
D. Provides a last line of defense against cyber attacks

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does NA-Safe Controllability aim to achieve in CPS security?

A. Prevents unauthorized access
B. Minimizes control system deviation in DoS attack environment
C. Monitors communication channels
D. Adds watermark to the physical system

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What challenges does the high availability requirement impose on security mechanisms in ICS?

A. Low latency demands
B. Limited downtime for security updates
C. Excessive use of firewalls
D. Inability to perform vulnerability assessments

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why might security updates/patching be delayed in ICS, according to the provided information?

A. Lack of security mechanisms in ICS
B. Increased risk of cyber attacks
C. Incompatibility with security patches
D. Mandatory reboots after patch installation

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can security assessment activities impact ICS operations?

A. Improve system reliability
B. Enhance communication channels
C. Degrade system performance or even crash the system
D. Expedite scheduled maintenance/outages

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the potential downside of fail-closed security mechanisms in ICS?

A. Improved system safety
B. Negative impact on ICS operations if incorrectly blocking authorized operations
C. Enhanced system reliability
D. Reduced security risks

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In geographically distributed ICSs, what vulnerability arises due to remote device tampering?

A. Unauthorized physical access
B. Manipulation of control
C. Enhanced system reliability
D. Improved system safety

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do distributed systems present challenges in system management for ICS operators and engineers?

A. Improved system safety
B. Physical access to the system
C. Implementation of remote administration interfaces
D. Limited access to system resources

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a common characteristic of embedded systems in ICS?

A. Abundant processing power
B. Support for IDS and anti-virus
C. High resource availability
D. Resource constraints, such as limited processing power and storage

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a key reason for the limited support of security mechanisms in OT systems?

A. Abundant support for security features
B. Comprehensive ICS security
C. Lack of technical capabilities in OT systems
D. Inadequate security controls in OT environments

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How do resource constraints in embedded systems influence the implementation of security features?

A. Facilitate the implementation of IDS and anti-virus
B. Increase battery life
C. Simplify scheduling of security-related tasks
D. Limit the ability to support certain security mechanisms

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What security-related differences exist between IT and OT network protocols?

A. IT protocols focus on communication errors
B. OT protocols lack security features
C. IT protocols do not use CRCs and parity check
D. OT protocols are designed for user confidentiality

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do real-time performance demands impact the implementation of security mechanisms in ICS?

A. Facilitate encryption and authentication of messages
B. Simplify scheduling of security-related tasks
C. Introduce challenges, such as communication latency and jitter
D. Improve the lifespan of battery-powered devices

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a challenge associated with implementing cryptographic protections on system communications in ICS?

A. Increased reliability from communication errors
B. Limited support for network security devices
C. Reduced latency in power systems
D. Availability of ample computation power

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How do legacy technologies contribute to security challenges in ICSs?

A. Enhance security against modern threats
B. Provide built-in encryption
C. Have undergone extensive security testing
D. Lack support for encryption and authentication

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why do cyber-physical risk analysis in ICSs present unique challenges?

A. Physical systems are directly vulnerable to cyber attacks
B. Mechanical and analog systems do not require analysis
C. Non-digital controls simplify risk analysis
D. Cyber components, physical system properties, and non-digital control complicate analysis

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the traditional priority in human operators of ICSs?

A. Availability and safety
B. IT security
C. User confidentiality
D. System hardening

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why is it critical to understand the differences between IT and ICS security methods?

A. To prioritize user confidentiality
B. To manage expectations of future ICS security
C. To simplify ICS operations
D. To enhance IT security

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which event in 1999 was attributed to a malfunction of the SCADA.system, resulting in casualties and environmental damage?

A. Maroochy Shire sewage plant incident
B. Bellingham gasoline pipe explosion
C. Stuxnet cyber attack
D. AGA.cryptographic protection

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How did a disgruntled employee cause environmental damage at the Maroochy Shire sewage plant in Australia?

A. Manually tampered with the physical systems
B. Remotely accessed wireless networks and dumped sewerage
C. Implemented real-time performance demands
D. Conducted cyber-physical risk analysis

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Who presented a detailed analysis of cracking Stuxnet, a 21st-century cyber weapon?

A. AGA.
B. Ralph Langner
C. NIST
D. IEC

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the technical challenges associated with ICS?

A. Limited support for security mechanisms
B. Enhanced security in OT systems
C. Abundant support for all security features
D. Seamless integration with IT systems

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What does ‘fail-closed’ mean in the context of security mechanisms in ICS?

A. Mechanisms default to a state denying access
B. Mechanisms default to open state
C. Mechanisms prioritize safety over security
D. Mechanisms are resistant to failures

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the purpose of a fail-closed security mechanism in ICS?

A. Prioritize safety by defaulting to open state
B. Block unauthorized access by defaulting to deny state
C. Facilitate security assessment activities
D. Minimize the impact on ICS operations

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How do geographic locations pose challenges to ICS security?

A. Enhance physical system protections
B. Simplify implementation of security mechanisms
C. Increase vulnerability to physical tampering
D. Facilitate direct physical access to ICS

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a key factor influencing the implementation of security features in embedded systems?

A. Abundant processing power
B. Limited resource constraints
C. Support for security mechanisms like IDS
D. Increased lifespan of battery-powered devices

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the role of network protocols in ICS security?

A. Simplify the integration of digital, analog, and mechanical controls
B. Provide limited support for protocols in network security devices
C. Increase support for IT protocols in ICS
D. Facilitate real-time performance demands

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a limitation of using traditional IT protocols in ICS security?

A. Enhanced reliability from communication errors
B. Increased support from network security devices
C. Improved security capabilities
D. Limited support of protocols in many network security devices

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

How do real-time operations complicate the scheduling of security-related tasks in ICS?

A. Simplify the implementation of security features
B. Provide ample time for scheduling security tasks
C. Leave little time for scheduling security tasks
D. Decrease power consumption in battery-powered devices

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

How do resource constraints in embedded systems affect the implementation of security features?

A. Facilitate implementation of security mechanisms like IDS
B. Enable seamless scheduling of security tasks
C. Increase support for cryptographic protections
D. Influence the ability to implement security features

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is a characteristic of many ICSs due to long system lifespans?

A. Regular updates to security mechanisms
B. Extensive security testing during design
C. Dependence on modern technologies
D. Heavy reliance on legacy technologies

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

How does the lack of security mechanisms in OT systems impact ICS security?

A. Facilitates comprehensive ICS security
B. Simplifies the implementation of security controls
C. Results in challenges due to lack of supported security features
D. Enhances technical security controls

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a challenge posed by embedded systems in ICS?

A. Increased lifespan of battery-powered devices
B. Ample support for security mechanisms like IDS
C. Limited processing power and storage
D. Seamless scheduling of security tasks

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the significance of network protocols in ICS security?

A. Increase support for IT protocols in ICS
B. Simplify integration of digital, analog, and mechanical controls
C. Provide extensive support for protocols in network security devices
D. Ensure real-time performance demands are met

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is a consequence of real-time performance demands on ICS security?

A. Simplification of scheduling security-related tasks
B. Decreased reliance on cryptographic protections
C. Challenges in implementing security mechanisms like encryption
D. Enhanced latency for various substation operations

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a challenge associated with legacy systems in ICS?

A. Regular updates to security mechanisms
B. Extensive security testing during design
C. Lack of user authentication, access control, and auditing capabilities
D. Dependence on modern technologies

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What contributes to the complexity of cyber-physical risk analysis in ICS?

A. Direct vulnerability of mechanical and analog systems
B. Digital controllers influencing non-digital control systems
C. Limited understanding of security postures of esoteric technologies
D. Overestimation of the risk from a cyber attack

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

How do ICSs differ from traditional IT systems?

A. Similar hardware and network infrastructure
B. Different human usage policies
C. Focus on user confidentiality and integrity
D. Convergence of technologies

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is a characteristic of IT security methods in contrast to ICS security?

A. Similar performance requirements
B. Focus on protecting process control
C. Understanding and analyzing differences
D. Managing expectations of future ICS security

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

How do high-availability requirements impact security updates/patching in ICS?

A. Increase the risk of cyber attacks
B. Require frequent unscheduled downtime
C. Allow immediate installation of patches
D. Often necessitate waiting until scheduled maintenance/outage period

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is a limitation of security assessments in high-availability ICS?

A. Increase in system performance during assessments
B. Limited impact on vulnerability assessments
C. Compatibility with various assessment and auditing activities
D. Potential degradation or system crashes due to assessment techniques

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

How can fail-closed security mechanisms negatively impact ICS operations?

A. Ensure uninterrupted access to authorized individuals
B. Always default to a state allowing unrestricted access
C. Block unauthorized individuals but may also block authorized operations
D. Prioritize safety over security in all cases

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

In geographically distributed ICSs, what makes the system vulnerable to physical tampering?

A. Centralized physical system protections
B. Remote device access with manipulation capabilities
C. Inability to implement remote administration interfaces
D. Limited access to system resources by attackers

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What challenge do resource constraints pose in embedded systems of ICSs?

A. Enhanced support for security mechanisms like IDS
B. Increased processing power for advanced security features
C. Seamless scheduling of security-related tasks
D. Limitations in implementing security features due to constrained resources

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

How do OT systems differ from IT systems in terms of security mechanisms?

A. Both have extensive support for OT protocols
B. OT systems lack security mechanisms to protect ICS
C. IT systems provide limited support for protocols
D. IT protocols often lack security features like HTTP->HTTPS

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

How does the performance overhead for cryptographic operations impact ICS domains?

A. Decreases latency in power systems
B. Has minimal effect on computation power of embedded systems
C. Increases power consumption and reduces device lifespan
D. Supports the viability of RSA.and DSA.for most ICS

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What challenge is associated with the long lifespan of legacy technologies in ICSs?

A. Frequent updates to security mechanisms
B. Continuous security testing during design
C. Extensive support for encryption and authentication
D. Lack of security mechanisms to protect against modern threats

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is a characteristic of non-digital control systems in ICS cyber-physical risk analysis?

A. Vulnerability to cyber attacks
B. Direct manipulation by digital controllers
C. Simplification of risk analysis process
D. Complexity introduced by mechanical, electromagnetic, and analog systems

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How do ICS security concerns differ from traditional IT systems?

A. Convergence of hardware and network infrastructure
B. Focus on protecting user confidentiality and integrity
C. Similar human usage policies
D. Minimal impact of technologies converging into ICSs

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What key requirements are associated with securing Cyber-Physical Systems (CPS)?

A. Connectivity and speed
B. Privacy, resiliency, dependability, interaction, operational security
C. Frequent unscheduled downtime
D. Minimal coordination and system hardening

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

In the context of OT challenges, what does ‘Limited Support’ refer to in NIST 800-82?

A. Extensive support for OT protocols
B. Key security mechanisms supported in OT environments
C. Lack of supported security features in many OT systems
D. Comprehensive OT system security without challenges

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What influences the ability to implement security features in embedded systems of ICSs?

A. Increased processing power
B. Seamless scheduling of security tasks
C. Resource constraints like limited processing power, storage, bandwidth
D. Compatibility with advanced security mechanisms

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is a security-related difference between IT and OT network protocols?

A. Both prioritize security over communication errors
B. IT protocols lack security features like HTTPS
C. OT protocols often have updated versions with enhanced security
D. Firewalls and IDS have extensive support for OT protocols

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

How do communication latency and jitter impact real-time performance in ICS?

A. Have no effect on real-time operation
B. Increase the efficiency of security mechanisms
C. Introduce challenges in implementing security mechanisms
D. Support the implementation of encryption and authentication

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is a challenge associated with the use of legacy technologies in ICSs?

A. Frequent updates and continuous testing during design
B. Extensive support for encryption and authentication
C. Lack of security mechanisms to protect against modern threats
D. Inherent security features in legacy systems

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Why are cyber-physical risk analysis processes complicated in ICSs?

A. Simplification due to digital controllers
B. Limited complexity in the analysis of cyber attacks
C. Non-digital control systems that are directly vulnerable
D. Minimal impact on the risk analysis process

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

In managerial challenges, what is the emphasis of ICS security concerns over traditional IT systems?

A. Convergence of hardware and network infrastructure
B. Focus on protecting user confidentiality and integrity
C. Similar human usage policies
D. The dominance of availability and safety over security concerns

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is the uptime requirement for ICS systems in terms of percentage, according to high availability needs?

A. 95% - 99%
B. 99.99% - 99.999%
C. 90% - 95%
D. 80% - 85%

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Why is security assessment challenging in ICS, particularly regarding penetration testing and vulnerability assessments?

A. They enhance system performance
B. They require minimal computation
C. They can crash the system or degrade performance
D. They are unnecessary in ICS environments

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is a consequence of introducing fail-closed security mechanisms in ICS?

A. Increased vulnerability to cyber attacks
B. Improved system reliability
C. Enhanced ease of operation
D. Limited impact on ICS operations

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

How does the geographic distribution of ICS systems pose challenges for physical system protections?

A. It enhances physical security
B. It eliminates the risk of physical tampering
C. It leaves the system vulnerable to physical tampering
D. It simplifies system management

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is a characteristic of network protocols in ICS that distinguishes them from IT protocols?

A. Equal support for security features
B. Common security features like HTTPS
C. Limited support in network security devices
D. Seamless integration with firewall and IDS

A

C

70
Q

What is a major concern related to real-time performance in ICS, especially in power systems?

A. Excessive communication latency
B. Inability to perform public-key cryptography
C. Limited impact on controllers and communication systems
D. Availability of advanced security mechanisms

A

B

71
Q

How does the use of esoteric technologies in ICS impact security?

A. Simplifies the security posture
B. Enhances the availability of skilled professionals
C. Presents well-understood security challenges
D. Poses challenges in finding skilled professionals and performing security assessments

A

D

72
Q

Why are cyber-physical risk analysis processes complicated in ICS?

A. Simplification due to digital controllers
B. Limited complexity in the analysis of cyber attacks
C. Non-digital control systems that are directly vulnerable
D. Minimal impact on the risk analysis process

A

C

73
Q

What operational differences distinguish ICS from IT systems?

A. Human control priority and safety concerns
B. Focus on user confidentiality and integrity
C. Similar hardware and network infrastructure
D. Common performance requirements

A

A

74
Q

What is the primary focus of human operators in traditional ICS (OT) systems?

A. User confidentiality
B. Process control
C. Network infrastructure
D. System hardening

A

B

75
Q

In the context of ICS, what does IT security primarily focus on protecting?

A. User confidentiality
B. Process control
C. System hardening
D. Operational security (OpSec)

A

A

76
Q

Why is it crucial to understand the differences between IT and ICS security methods?

A. To eliminate any differences
B. To manage expectations of future ICS security
C. To prioritize user confidentiality
D. To enhance network infrastructure

A

B

77
Q

How do legacy technologies impact the implementation of strong security in ICS?

A. Simplify security implementation
B. Provide modern security features
C. Lack support for encryption and authentication
D. Facilitate user authentication and access control

A

C

78
Q

What is the outcome of a malfunction in the SCADA.system, as evidenced by the 1999 incident in Bellingham, WA?

A. Improved system reliability
B. Enhanced safety measures
C. Large explosion and casualties
D. Optimal operational security (OpSec)

A

C

79
Q

How did a disgruntled employee impact the Maroochy Shire sewage plant in Australia in 2000?

A. Improved plant efficiency
B. Released sewerage into rivers
C. Enhanced security measures
D. Reduced environmental impact

A

B

80
Q

What does Ralph Langner discuss in the video ‘Cracking Stuxnet, a 21st-century cyber weapon’?

A. Cybersecurity challenges in ICS
B. The impact of legacy technologies
C. The Maroochy Shire sewage plant incident
D. The development of Stuxnet

A

A

81
Q

How does the convergence of IT system technologies into ICS impact security management?

A. It simplifies security challenges
B. It introduces new hardware and network infrastructure
C. It eliminates the need for security defense methods
D. It requires understanding and analyzing differences in security methods

A

D

82
Q

What is the main challenge posed by limited support for security mechanisms in OT systems?

A. Simplified implementation of security controls
B. Increased vulnerability of ICS
C. Enhanced security features
D. Improved support for protocols

A

B

83
Q

How do resource constraints in embedded systems affect the implementation of security features in ICS?

A. Facilitate support for IDS and anti-virus
B. Increase processing power and storage
C. Limit support for certain security mechanisms
D. Enhance scheduling of security-related tasks

A

C

84
Q

What is the key difference in security capabilities between IT and OT protocols?

A. Both prioritize user confidentiality
B. IT protocols have CRCs and parity check for communication errors
C. OT protocols have updated versions with added security features
D. Both offer robust support for network security devices

A

B

85
Q

Why is real-time performance crucial in ICS, and what challenges does it introduce for security mechanisms?

A. Real-time operation is not important in ICS
B. Real-time performance enhances encryption and authentication
C. Real-time operation impacts controllers and communication systems
D. Real-time performance reduces power consumption

A

C

86
Q

How do legacy systems differ from modern ICS in terms of security mechanisms?

A. Legacy systems have robust security features
B. Modern ICS lack support for encryption
C. Legacy systems offer user authentication and access control
D. Modern ICS prioritize system hardening

A

B

87
Q

What complicates the cyber-physical risk analysis in ICS?

A. Digital controllers that directly influence mechanical systems
B. Limitations in manipulating the system
C. Well-understood risk from cyber attacks
D. Overestimation of the risk from cyber attacks

A

A

88
Q

What distinguishes ICS from IT systems in terms of operational differences?

A. Process control priority and safety concerns
B. Similar hardware and network infrastructure
C. Common performance requirements
D. Focus on user confidentiality

A

A

89
Q

How does the geographic distribution of ICS impact physical system protections and system management?

A. Enhances physical system protections
B. Reduces the need for remote administration interfaces
C. Limits the impact of physical tampering
D. Introduces challenges in physical system protections and remote administration

A

D

90
Q

What are the implications of high-availability requirements on security functions like patching and security assessment?

A. Increased performance of security mechanisms
B. Simplified scheduling of downtime for patching
C. Limitations in security functions due to downtime constraints
D. Enhanced security assessment activities

A

C

91
Q

How does the concept of ‘fail-closed’ security mechanisms introduce conflicting objectives in ICS?

A. It enhances the correct operation of ICS
B. It prioritizes security over safety
C. It defaults to allowing unauthorized access
D. It doesn’t impact the correct operation of ICS

A

B

92
Q

What are the unique communication protocols and architectures required by ICS?

A. Only traditional IT protocols
B. Only OT-specific protocols
C. Both traditional IT and OT-specific protocols
D. Neither traditional IT nor OT-specific protocols

A

C

93
Q

What key security mechanisms are often unsupported within OT environments, as per NIST 800-82?

A. Limited support for protocols
B. Robust support for security features
C. Adequate testing of security patches
D. Key security mechanisms such as user authentication

A

A

94
Q

How do limited support and resource constraints in OT systems affect the implementation of security controls?

A. Facilitate easy implementation of security controls
B. Result in enhanced support for protocols
C. Create challenges in implementing security controls
D. Ensure comprehensive security assessments

A

C

95
Q

What is the impact of real-time operation on the ability to perform computationally expensive public-key cryptography in ICS?

A. Real-time operation has no impact
B. It facilitates cryptographic operations
C. It poses challenges due to time constraints
D. It reduces power consumption during cryptographic operations

A

C

96
Q

Why do many ICSs depend on legacy technologies, and what challenges do they pose for security implementation?

A. Legacy technologies prioritize security features
B. Legacy systems lack support for encryption
C. They offer user authentication and access control
D. Legacy systems have undergone rigorous security testing

A

B

97
Q

How do operational technology (OT) systems differ from information technology (IT) systems in terms of security mechanisms?

A. OT systems prioritize user confidentiality
B. IT systems lack security mechanisms
C. OT systems lack support for ICS security
D. IT systems focus on process control and safety

A

C

98
Q

Provide an example of a safety-related ICS failure and its consequences.
A. Bellingham gasoline pipeline explosion
B. Maroochy Shire sewage plant incident
C. Cyber-Physical Risk Analysis in ICS
D. Ralph Langner’s analysis of Stuxnet

A

A

99
Q

How does the convergence of IT systems into ICS impact the management of future ICS security?

A. It simplifies the understanding of ICS security challenges
B. It makes ICS security less critical
C. It highlights the importance of understanding and analyzing differences
D. It reduces the need for managing ICS security expectations

A

C

100
Q

Which security functions are constrained by high-availability needs in ICS?

A. System hardening
B. Security updates/patching
C. Security assessment
D. Fail-open security mechanisms

A

B

101
Q

What challenges arise in implementing physical system protections for geographically distributed ICSs?

A. Physical tampering risks
B. Enhanced security measures
C. Limited need for remote administration
D. Reduced system vulnerability

A

A

102
Q

Why are embedded systems in ICS challenging for security implementation?

A. They have unlimited processing power
B. They support all security mechanisms
C. They lack resource constraints
D. Resource constraints impact security feature implementation

A

D

103
Q

What are the security-related differences between IT and OT network protocols?

A. Both IT and OT protocols lack security features
B. IT protocols prioritize communication reliability
C. OT protocols have advanced security features
D. IT protocols are only designed for communication errors

A

B

104
Q

How do legacy and esoteric technologies pose challenges in ICS security?

A. They simplify security implementation
B. They lack user authentication and access control
C. They have undergone extensive security testing
D. They prioritize modern security threats

A

B

105
Q

What additional levels of protection do non-digital control systems provide against cyber attacks in ICS?

A. They facilitate easy cyber attack manipulation
B. They limit manipulation by presenting system constraints
C. They don’t impact cyber attack risk
D. They enhance cyber attack vulnerabilities

A

B

106
Q

What is the primary focus of IT security methods, and why is it critical to understand the differences when defending ICSs?

A. Protecting user confidentiality and integrity
B. Prioritizing ICS process control
C. Enhancing operational security (OpSec)
D. Managing system hardening processes

A

A

107
Q

Describe the 1999 ICS failure in Bellingham, WA, USA, and its consequences.
A. Maroochy Shire sewage plant incident
B. Cyber-Physical Risk Analysis in ICS
C. Bellingham gasoline pipeline explosion
D. Ralph Langner’s analysis of Stuxnet

A

C

108
Q

How does the lack of security mechanisms in OT systems impact the overall security of ICS?

A. It simplifies ICS security implementation
B. It enhances the security posture of ICS
C. It introduces challenges in implementing security controls
D. It ensures comprehensive security assessments

A

C

109
Q

What is the impact of installing security updates/patching on ICS availability?

A. It enhances ICS availability
B. It has no impact on availability
C. It degrades availability
D. It reduces operational ICS risks

A

C

110
Q

Why are security assessments challenging in ICS, and what limitations do they face?

A. They are easy to conduct without impacting system performance
B. They limit operational risks in ICS
C. Techniques used in assessments can degrade performance or crash the system
D. They are always conducted during scheduled maintenance

A

C

111
Q

What is the challenge posed by fail-closed security mechanisms in ICS?

A. They enhance ICS operations
B. They don’t impact authorized operations
C. They default to a state that denies access, potentially affecting ICS operations
D. They ensure smooth system operation even with incorrect passwords

A

C

112
Q

How do resource constraints in embedded systems impact the ability to implement security features in ICS?

A. They have no impact on security feature implementation
B. They enable the support of all security mechanisms
C. They enhance battery life in battery-powered devices
D. They limit the implementation of certain security mechanisms

A

D

113
Q

Why do ICSs require network protocols, and what are the security-related differences between IT and OT protocols?

A. ICSs don’t require network protocols
B. IT and OT protocols are identical
C. Security capabilities differ; IT protocols often lack security features
D. Both IT and OT protocols prioritize security features

A

C

114
Q

What challenges does real-time performance impose on ICS, especially in power systems?

A. It simplifies computational tasks
B. It reduces power consumption in ICS
C. Latency and jitter are critical for real-time operation
D. Public-key cryptography is easily performed within real-time constraints

A

C

115
Q

How do latency challenges impact the implementation of cryptographic protections in ICS?

A. Latency has no impact on cryptographic protections
B. Cryptographic protections are easily implemented within latency constraints
C. Latency challenges are specific to legacy systems
D. Latency challenges affect the performance of cryptographic operations

A

D

116
Q

What challenges arise from the dependence on legacy and esoteric technologies in ICS?

A. They simplify security implementations
B. Legacy systems lack support for encryption and authentication
C. Legacy devices undergo extensive security testing
D. They enhance the security posture of ICS

A

B

117
Q

How does the combination of cyber components, physical system properties, and non-digital control complicate cyber-physical risk analysis in ICS?

A. It simplifies the risk analysis process
B. It limits the impact of cyber attacks on ICS
C. It introduces complexities in understanding how an attacker could manipulate system control
D. It ensures a well-understood risk analysis process

A

C

118
Q

Why is it critical to understand and analyze the differences between IT and OT systems in the context of ICS security?

A. IT and OT systems are identical
B. ICSs prioritize user confidentiality over process control
C. IT security methods are not applicable to ICSs
D. Understanding differences helps manage expectations of future ICS security

A

D

119
Q

How does the lack of security mechanisms in OT systems contribute to the challenges of ICS security?

A. It simplifies ICS security implementation
B. Understanding technical capabilities is unnecessary
C. NIST 800-82 provides comprehensive security mechanisms for OT systems
D. Implementation challenges arise due to unsupported security features in many OT systems

A

D

120
Q

Why do embedded systems in ICS face resource constraints, and what impact does it have on security?

A. Resource constraints have no impact on embedded systems
B. Resource constraints increase processing power in embedded systems
C. Security features are easily supported in resource-constrained embedded systems
D. Resource constraints limit the implementation of security features in embedded systems

A

D

121
Q

What is a key security challenge related to network security devices in the context of OT protocols?

A. Firewalls and IDS fully support all OT protocols
B. OT protocols have widespread support in network security devices
C. Firewalls and IDS face limitations in developing rules for unique parameters within OT protocols
D. Security devices in OT environments have unlimited support for all protocols

A

C

122
Q

Why is real-time operation crucial for ICS, and how does it impact the implementation of security mechanisms?

A. Real-time operation is not essential for ICS
B. It simplifies encryption and authentication processes
C. Latency and jitter are irrelevant in real-time operation
D. Real-time constraints pose challenges in implementing security mechanisms

A

D

123
Q

How does the lack of security mechanisms in legacy systems affect ICS security?

A. Legacy systems provide advanced security features
B. Legacy systems have robust user authentication and access control
C. Legacy systems undergo frequent security testing
D. Additional technologies like VPNs and firewalls are required to protect legacy systems

A

D

124
Q

How do non-digital control systems in ICS impact cyber-physical risk analysis?

A. They have no impact on risk analysis
B. They limit the manipulation of system control in cyber attacks
C. Risk analysis is simplified due to non-digital control
D. Non-digital control systems are directly vulnerable to cyber attacks

A

B

125
Q

Why are process control, availability, and safety prioritized in ICS, and how does it differ from IT systems?

A. IT systems prioritize availability and safety over process control
B. Process control is not a priority in ICS
C. IT and ICS systems are identical in their priorities
D. Understanding the differences helps manage expectations of future ICS security

A

D

126
Q

What are the key requirements for ensuring high availability in ICS?

A. Low uptime requirements
B. Unscheduled downtime for maintenance
C. System hardening during scheduled outages
D. No implications on the design and deployment of security mechanisms

A

C

127
Q

How does the requirement for 99.99% - 99.999% uptimes impact security updates/patching in ICS?

A. Updates can be installed anytime without affecting uptime
B. Updates always reduce operational ICS risks
C. Scheduled maintenance is unnecessary for updates
D. Updates often wait until scheduled maintenance/outage periods

A

D

128
Q

Why are security assessments challenging in high-availability ICS?

A. Assessments do not impact system performance
B. Port scans and vulnerability assessments enhance system reliability
C. Security assessment techniques do not exist for ICS
D. Assessment activities can degrade performance or even crash the system

A

D

129
Q

How can fail-closed security mechanisms impact ICS operations negatively?

A. They never block authorized operations
B. They default to a state that denies access
C. They enhance ICS operations without any negative impact
D. They never interfere with critical system operations

A

B

130
Q

What challenges arise in implementing physical system protections for geographically distributed ICSs?

A. Physical tampering is not a concern in distributed systems
B. Remote device tampering does not affect control or data
C. Physical system access does not pose security risks
D. Remote administration interfaces are unnecessary for distributed systems

A

D

131
Q

Why do ICSs face challenges with unique communication protocols, real-time performance demands, and complex integration?

A. They do not require unique communication protocols
B. Real-time performance is not crucial for ICS operation
C. Integration is straightforward in ICS
D. ICSs have domain-specific requirements and constraints

A

D

132
Q

What does NIST 800-82 highlight regarding technical security controls and OT environments?

A. OT systems fully support all technical security controls
B. Technical security controls are unnecessary in OT environments
C. Unsupported security features are a challenge in OT environments
D. Technical security controls are standardized across all OT systems

A

C

133
Q

Why do many ICSs depend on legacy technologies, and what challenges does it introduce for security?

A. Legacy technologies offer better security features
B. Legacy systems have frequent security updates
C. Legacy technologies have widespread support for modern threats
D. Legacy technologies lack support for encryption and authentication

A

D

134
Q

Why is the risk from a cyber attack often understated and underestimated in ICS?

A. Cyber attacks pose no risk to ICS
B. Complexity in cyber components and non-digital control simplifies risk analysis
C. Risk analysis in ICS is straightforward
D. Cyber attacks always have catastrophic consequences in ICS

A

B

135
Q

Why is it critical to understand and analyze the differences between IT and ICS security methods?

A. IT security methods are not applicable to ICS
B. IT and ICS security methods are identical
C. Analyzing differences is unnecessary for managing ICS security
D. Converging IT systems into ICS requires understanding and analyzing differences

A

D

136
Q

How can resource constraints in embedded systems affect ICS security?

A. Resource constraints have no impact on security features
B. Resource constraints limit the implementation of security features
C. Embedded systems support all security mechanisms
D. Resource constraints enhance the lifespan of battery-powered devices

A

B

137
Q

What are the security-related differences between IT and OT network protocols?

A. IT protocols lack security features, while OT protocols prioritize security
B. IT and OT protocols have identical security features
C. IT protocols are always more secure than OT protocols
D. Security devices offer extensive support for all IT and OT protocols

A

A

138
Q

Why are real-time performance demands a challenge for implementing security mechanisms in ICS?

A. Real-time performance has no impact on security
B. Security mechanisms enhance real-time performance
C. Computation and communication requirements for security mechanisms can conflict with real-time operation
D. IEC.61850 standard does not impose latency requirements on substation operations

A

C

139
Q

What challenges arise from esoteric technologies in ICS, and how do they impact security?

A. Esoteric technologies simplify security management in ICS
B. Esoteric technologies have well-understood security postures
C. Esoteric technologies are broadly used outside of ICS
D. Security posture of esoteric technologies is not well understood, creating challenges in finding skilled professionals

A

D

140
Q

What type of systems are not directly vulnerable to cyber attacks in ICS, and how does this affect the risk analysis process?

A. Analog and electromagnetic systems are directly vulnerable
B. Only digital controllers are directly vulnerable
C. Cyber attacks have no impact on risk analysis in ICS
D. Non-digital control systems present limitations in how the system can be manipulated

A

D

141
Q

Why do ICSs traditionally prioritize process control, and what dominates security concerns in ICS?

A. Process control is not a priority in ICS
B. Security concerns in ICS are primarily about user confidentiality
C. Availability and safety dominate security concerns in ICS
D. IT systems are the main focus of security concerns in ICS

A

C

142
Q

How can resource constraints in embedded systems affect ICS security?

A. Resource constraints have no impact on security features
B. Resource constraints limit the implementation of security features
C. Embedded systems support all security mechanisms
D. Resource constraints enhance the lifespan of battery-powered devices

A

B

143
Q

What are the security-related differences between IT and OT network protocols?

A. IT protocols lack security features, while OT protocols prioritize security
B. IT and OT protocols have identical security features
C. IT protocols are always more secure than OT protocols
D. Security devices offer extensive support for all IT and OT protocols

A

A

144
Q

Why are real-time performance demands a challenge for implementing security mechanisms in ICS?

A. Real-time performance has no impact on security
B. Security mechanisms enhance real-time performance
C. Computation and communication requirements for security mechanisms can conflict with real-time operation
D. IEC.61850 standard does not impose latency requirements on substation operations

A

C

145
Q

What challenges arise from esoteric technologies in ICS, and how do they impact security?

A. Esoteric technologies simplify security management in ICS
B. Esoteric technologies have well-understood security postures
C. Esoteric technologies are broadly used outside of ICS
D. Security posture of esoteric technologies is not well understood, creating challenges in finding skilled professionals

A

D

146
Q

What type of systems are not directly vulnerable to cyber attacks in ICS, and how does this affect the risk analysis process?

A. Analog and electromagnetic systems are directly vulnerable
B. Only digital controllers are directly vulnerable
C. Cyber attacks have no impact on risk analysis in ICS
D. Non-digital control systems present limitations in how the system can be manipulated

A

D

147
Q

Why do ICSs traditionally prioritize process control, and what dominates security concerns in ICS?

A. Process control is not a priority in ICS
B. Security concerns in ICS are primarily about user confidentiality
C. Availability and safety dominate security concerns in ICS
D. IT systems are the main focus of security concerns in ICS

A

C

148
Q

What is the primary function of coils in Modbus communication within an ICS?

A. Store input data
B. Store output data
C. Store configuration data
D. Store holding data

A

B

149
Q

In Modbus, which type of register is used for output values, representing the outputs of an ICS device?

A. Coils
B. Input Registers
C. Holding Registers
D. Discrete Inputs

A

C

150
Q

What is the purpose of holding registers in an ICS using Modbus protocol?

A. Store input values
B. Store output values
C. Store status information
D. Store discrete inputs

A

B

151
Q

When dealing with Modbus communication, what type of register is used to read input status, representing the discrete inputs of an ICS device?

A. Coils
B. Holding Registers
C. Input Registers
D. Discrete Inputs

A

C

152
Q

What differentiates holding registers from input registers in Modbus communication within an ICS?

A. Holding registers store input values
B. Input registers store output values
C. Holding registers store configuration data
D. Input registers store status information

A

C

153
Q

Which Modbus register type is used for monitoring the state of physical devices, representing the on/off status of discrete inputs in an ICS?

A. Coils
B. Input Registers
C. Holding Registers
D. Discrete Inputs

A

D

154
Q

What function do input registers serve in Modbus communication within an ICS?

A. Store input values
B. Store output values
C. Store configuration data
D. Store holding data

A

A

155
Q

What type of control system is characterized by a continuous and ongoing response to changes in the controlled variable?

A. Open-loop control system
B. Closed-loop control system
C. On-off control system
D. Adaptive control system

A

B

156
Q

In which control system does the output depend on the current state of the system and the applied input?

A. Open-loop control system
B. Closed-loop control system
C. On-off control system
D. Adaptive control system

A

B

157
Q

Which control system maintains the process variable at the desired setpoint by comparing it to the reference input and making continuous adjustments?

A. Open-loop control system
B. Closed-loop control system
C. On-off control system
D. Adaptive control system

A

B

158
Q

What type of control system operates without feedback and does not adjust its output based on the system’s performance?

A. Open-loop control system
B. Closed-loop control system
C. On-off control system
D. Adaptive control system

A

A

159
Q

Which control system switches the output on or off based on whether the process variable is above or below a setpoint?

A. Open-loop control system
B. Closed-loop control system
C. On-off control system
D. Adaptive control system

A

C

160
Q

What type of control system adjusts its parameters based on the system’s performance over time?

A. Open-loop control system
B. Closed-loop control system
C. On-off control system
D. Adaptive control system

A

D

161
Q

Which control system is also known as a feedback control system?

A. Open-loop control system
B. Closed-loop control system
C. On-off control system
D. Adaptive control system

A

B

162
Q

What is the size (in bits) of a Modbus Coil?

A. 8 bits
B. 16 bits
C. 32 bits
D. 64 bits

A

1

163
Q

How many bits are there in a Modbus Input Discrete?

A. 8 bits
B. 16 bits
C. 32 bits
D. 64 bits

A

1

164
Q

What is the size (in bits) of a Modbus Holding Register?

A. 8 bits
B. 16 bits
C. 32 bits
D. 64 bits

A

16

165
Q

How many bits are there in a Modbus Input Register?

A. 8 bits
B. 16 bits
C. 32 bits
D. 64 bits

A

16

166
Q

What Modbus data type is often used for representing floating-point values and has a size of 32 bits?

A. Coil
B. Holding Register
C. Input Register
D. Float Register

A

C

167
Q

What is the defense-in-depth strategy in CPS security?

A

A.strategy that employs multiple layers of security controls to protect the system from various threats and attacks.

168
Q

How does the defense-in-depth strategy enhance CPS security?

A. By adding redundancy to security measures
B. By creating multiple barriers against potential threats
C. By addressing vulnerabilities at different layers
D. All of the above

A

D

169
Q

Why is defense-in-depth important for securing CPS?

A. It provides a holistic approach to security
B. It mitigates the impact of potential breaches
C. It addresses vulnerabilities in a comprehensive manner
D. All of the above

A

D

170
Q

How does the Shadow Security Unit (SSU) contribute to the security of SCADA systems?

A. By replacing PLCs and RTUs
B. By monitoring communication control channels
C. By establishing physical process Input/Output lines
D. By minimizing operational assessments of PLCs and RTUs

A

B