Week 9 Q's Flashcards
What characterizes coordinated cyber-physical attacks?
A. They involve only digital actions.
B. They aim to disrupt digital systems.
C. They orchestrate actions in both digital and physical realms.
D. They require minimal planning and coordination.
C. They orchestrate actions in both digital and physical realms.
What does “covertness” in cyber-physical attacks refer to?
A. The attacker’s ability to predict system behavior accurately.
B. The ease with which the attacker can gain access to the target.
C. The attacker’s capacity to avoid detection or perception.
D. The speed at which the attack is executed.
C. The attacker’s capacity to avoid detection or perception.
What are cybernetically covert attacks?
A. Attacks that are easily detected by monitoring algorithms.
B. Attacks that cause physical effects easily noticed by humans.
C. Attacks that target network communications.
D. Attacks that are difficult to detect by monitoring software, communications, and data.
D. Attacks that are difficult to detect by monitoring software, communications, and data.
Question 4:
Which attack has the highest level of complexity and requires deeper understanding of the ICS?
A. DoS
B. Fuzzing
C. Service degradation
D. System identification
C. Service degradation