Switchyard Access Flashcards

1
Q

What role does NERC play in relation to CIP Standards

A

NERC develops CIP Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What role does WECC play in relation to CIP Standards

A

WECC enforces CIP Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What role does FERC play in relation to CIP Standards

A

FERC regulates CIP Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What body has the legal authority to enforce compliance with NERC reliability standards?

A

WECC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NERC is the acronym for:

A

North American Electric Reliability Corporation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What CIP Standard addresses training requirements?

A

CIP-004

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What CIP Standard addresses physical security

A

CIP-006

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network devices that make up the logical border surrounding the assets critical to the Bulk Electric System (BES) is known as

A

Electronic Security Perimeter (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What CIP Standard addresses the Electronic Security Perimeter?

A

CIP-005

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What CIP Standard addresses Systems Security Management?

A

CIP-007

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What action do you need to take if an ODN task is infeasible without the use of removable media?

A

File for an exemption and as a first step complete the correct form on the PG&E Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is unapproved software regarded as a threat to security?

A

It may interfere with the proper operation of PG&E systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A breach in cyber security could lead to

A

Loss of productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List two ways entrances and exits are controlled

A
  1. Automatic gates are controlled via phone, keycard, station key or remote control.
  2. Facilities are surrounded by a chain-link fence with gates that are to remain locked when authorized personnel are not present.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List 4 ways that automatic gates are controlled

A

phone, keycard, station key or remote control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What must be entered into the log book upon entering a facility

A

Name, affiliation, entry and exit times

17
Q

Name 3 possible security problems at facilities

A

Unauthorized visitors or trespassers
Fences may be cut, washed away or otherwise breached
Buildings may be vandalized or broken into.

18
Q

What CIP Standards specifically address access control?

A

CIP-003, CIP-004, CIP-005, CIP-006

19
Q

How long can a door be held open before an alarm is received?

A

20 seconds

20
Q

Name two methods used to protect information

A

Assigning a sensitivity level to information

Using good password practices

21
Q

Name two ways to protect information

A

Don’t leave work orders in copy rooms

Only release or share information on a business “need to know” basis

22
Q

Name three events that should be reported as cyber security incidents

A

Unexplained account lockouts
Unknown network connections
Outages impacting critical operations

23
Q

Cyber security incidents must be reported to

A

Electric Sector Information Sharing and Analysis Center (ES-ISAC)

24
Q

How often must the Cyber Security Incident Response Plan be updated?

A

Within 30 calendar days of any changes

25
Q

What CIP Standard specifically addresses Recovery of Assets?

A

CIP-009