Multiple Choice - Revision.pdf Flashcards
What are examples of Physical Systems in CPS?
A. Generators
B. Valves
C. Relays
D. All of the above
D
Which layer is not part of the Cyber Physical Systems (CPS) architecture?
A. Perception layer
B. Transmission layer
C. Application layer
D. Communication layer
D
In Control Systems, what are the two types, each with its own advantage and disadvantage?
A. Open-loop
B. Closed-loop
C. Feedback
D. Forward
A + B
What is the main reason for using control systems in the context of Automatic control?
A. To create disturbances
B. To maintain the controlled variable at a desired value
C. To avoid external disturbances
D. To complicate the process
B
What are the three operational zones in Industrial Control Systems (ICS)?
A. Enterprise zone,
B. Control zone,
C. Field zone
D. Operational zone
A. Enterprise zone,
B. Control zone,
C. Field zone
Which of the following is not an ICS component?
A. Programmable logic controller (PLC)
B. Data scientist
C. Human machine interface (HMI)
D. Communication gateway
B
What model is similar to TCP/IP or OSI models but for ICS security?
Purdue model
Which is not a type of ICS?
A. Process Control System
B. Safety Instrumented System (SIS)
C. Building Automation System
D. Internet of Things (IoT)
D
What are typical ICS protocols?
A. RS-232 and RS-485
B. Modbus
C. HART
D. All of the above
D
What is the Modbus function code used for?
A. Identifying slaves
B. Performing actions
C. Calculating CRC/LRC
D. Modulating TCP
B
What Modbus data type is used for 1-bit data that can be read/written by a client?
A. Inputs
B. Coils
C. Input register
D. Holding register
B
What Modbus data type is used for 1-bit data that can only be read by a client and is altered by I/O?
A. Inputs
B. Coils
C. Input register
D. Holding register
A
What Modbus data type is used for 16-bit data that can only be read by a client and is controlled by I/O?
A. Inputs
B. Coils
C. Input register
D. Holding register
C
What Modbus data type is used for 16-bit data that can only be read/written by a client and is controlled by I/O?
A. Inputs
B. Coils
C. Input register
D. Holding register
D
What is a characteristic of attacks on the perception execution layer?
A. Actuator enablement attacks (AE-attacks)
B. Actuator disablement attacks (AD-attacks)
C. Sensor erasure attack (SE-attacks)
D. All of the above
D