Multiple Choice - Revision.pdf Flashcards

1
Q

What are examples of Physical Systems in CPS?

A. Generators
B. Valves
C. Relays
D. All of the above

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which layer is not part of the Cyber Physical Systems (CPS) architecture?

A. Perception layer
B. Transmission layer
C. Application layer
D. Communication layer

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Control Systems, what are the two types, each with its own advantage and disadvantage?

A. Open-loop
B. Closed-loop
C. Feedback
D. Forward

A

A + B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main reason for using control systems in the context of Automatic control?

A. To create disturbances
B. To maintain the controlled variable at a desired value
C. To avoid external disturbances
D. To complicate the process

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three operational zones in Industrial Control Systems (ICS)?

A. Enterprise zone,
B. Control zone,
C. Field zone
D. Operational zone

A

A. Enterprise zone,
B. Control zone,
C. Field zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is not an ICS component?

A. Programmable logic controller (PLC)
B. Data scientist
C. Human machine interface (HMI)
D. Communication gateway

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What model is similar to TCP/IP or OSI models but for ICS security?

A

Purdue model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which is not a type of ICS?

A. Process Control System
B. Safety Instrumented System (SIS)
C. Building Automation System
D. Internet of Things (IoT)

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are typical ICS protocols?

A. RS-232 and RS-485
B. Modbus
C. HART
D. All of the above

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Modbus function code used for?

A. Identifying slaves
B. Performing actions
C. Calculating CRC/LRC
D. Modulating TCP

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Modbus data type is used for 1-bit data that can be read/written by a client?

A. Inputs
B. Coils
C. Input register
D. Holding register

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Modbus data type is used for 1-bit data that can only be read by a client and is altered by I/O?

A. Inputs
B. Coils
C. Input register
D. Holding register

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Modbus data type is used for 16-bit data that can only be read by a client and is controlled by I/O?

A. Inputs
B. Coils
C. Input register
D. Holding register

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What Modbus data type is used for 16-bit data that can only be read/written by a client and is controlled by I/O?

A. Inputs
B. Coils
C. Input register
D. Holding register

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a characteristic of attacks on the perception execution layer?

A. Actuator enablement attacks (AE-attacks)
B. Actuator disablement attacks (AD-attacks)
C. Sensor erasure attack (SE-attacks)
D. All of the above

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which attack is related to the communication path between the sensor and the controller?

A. DoS attack
B. Stale data attack
C. Actuator enablement attack
D. ARP poisoning

A

B

17
Q

Which is a challenge of CPS security?

A. Reduced performance
B. Higher power consumption
C. Compatibility issues
D. All of the above

A

D

18
Q

Which is a main CPS security solution?

A. Cryptographic-based solutions
B. Non-cryptographic-based solutions
C. Both A and B
D. None of the above

A

C

19
Q

What is the defense-in-depth strategy in cybersecurity?

A. Holistic protection
B. Single layer defense
C. Layering defense on the same layer
D. Overlapping defense on the same layer

A

A

20
Q

Why may the addition of a new security defense pose safety concerns in CPS?

A. It may violate safety certifications
B. It increases system efficiency
C. It enhances performance
D. It decreases transmission delay

A

A

21
Q

Which type of attack can lead to an unsafe state in the CPS?

A. Actuator insertion attack
B. Sensor insertion attack
C. Actuator erasure attack
D. Sensor erasure attack

A

D

22
Q

What is a challenge of the adoption of security measures in CPS?

A. Reduced performance
B. Higher power consumption
C. Compatibility issues
D. All of the above

A

D

23
Q

What is the purpose of network protocols in ICS security?

A. Simplify the integration of controls
B. Provide support for IT protocols
C. Facilitate real-time performance demands
D. All of the above

A

C

24
Q

How do high-availability requirements impact security updates/patching in ICS?

A. Increase the risk of cyber attacks
B. Require frequent unscheduled downtime
C. Allow immediate installation of patches
D. Often necessitate waiting until scheduled maintenance/outage period

A

D

25
Q

In geographically distributed ICSs, what makes the system vulnerable to physical tampering?

A. Centralized physical system protections
B. Remote device access with manipulation capabilities
C. Inability to implement remote administration interfaces
D. Limited access to system resources by attackers

A

B

26
Q

What is a characteristic of IT security methods in contrast to ICS security?

A. Similar performance requirements
B. Focus on user confidentiality and integrity
C. Understanding and analyzing differences
D. Managing expectations of future ICS security

A

B

27
Q

Which standard is highly recognized in CPS security?

A. ISO 9001
B. IEEE 802.11
C. IEC 62443
D. NIST 800-82

A

C

28
Q

Gathers data from the physical environment through sensors and devices, providing input for the control systems.

Sensor Erasure Attacks (SE-attacks)

Sensor Insertion Attacks (SI-attacks)

A

Perception Layer

29
Q

Facilitates the transmission of data between different components of the CPS, ensuring seamless communication.

DOS.

MiTM.

A

Transmission Layer

30
Q

Processes and analyzes the data received from the Perception layer, making decisions and generating commands for control.

Actuator Enablement Attacks (AE-attacks)

Actuator Disablement Attacks (AD-attacks)

A

Application Layer

31
Q

Manages business-related systems and services, separate from the operational aspects of the control system.

A

Enterprise Zone

32
Q

Monitors and controls physical processes, overseeing the operation of the industrial control system.

A

Control Zone

33
Q

Involves the physical processes, operations, and equipment that directly interact with the industrial environment.

A

Field Zone

34
Q

Change the sensor readings by erasing genuine sensor events.

A

Sensor Erasure Attacks (SE-attacks)

35
Q

Change the actuator commands by inserting false events. This may lead to an unsafe state.

A

Sensor Insertion Attacks (SI-attacks)

36
Q

Change the sensor readings to enable actuators.

A

Actuator Enablement Attacks (AE-attacks)

37
Q

Change the sensor readings to disable actuators.

A

Actuator Disablement Attacks (AD-attacks)