Copyright

Computer Science 330: Critical Infrastructure Security Final Exam

Free Practice Test Instructions:

Choose your answer to the question and click 'Continue' to see how you did. Then click 'Next Question' to answer the next question. When you have completed the free practice test, click 'View Results' to see your results. Good luck!

Question 1 1. When securing critical infrastructure from the internet, access control provides what type of communication between devices and central servers?

Question 2 2. Within an industrial network, these are the communication channels between the security zones.

Question 3 3. What best describes a SCADA/HMI or PLC zone?

Question 4 4. In order to establish security zones in an industrial network, you should analyze which of the following components:

Question 5 5. In order to secure conduits within an industrial network, what heavily-used control devices should be used?

Question 6 6. What best describes the following attacks: shutting down an oil refinery, triggering a reactor malfunction in a nuclear power plant, or shutting down power to a metropolitan area?

Question 7 7. This network security measure prevents an industrial network from being connected to the business network.

Question 8 8. How might an attack against a remote terminal unit (RTU) impact operations at a nuclear power plant?

Question 9 9. Why is it so important to secure industrial networks?

Question 10 10. How could a cyber criminal exploit an air gap to gain access to secure devices in an industrial network?

Question 11 11. As you take over the administration of an industrial network, you notice there is not much stopping hackers from getting to your SCADA systems through the internet. What solution should you implement first?

Question 12 12. What are the elements of a Quarantine System, used to protect devices in an industrial network?

Question 13 13. Critical infrastructure in the banking industry faces many risks, including strategic and financial. What other risk does the industry face?

Question 14 14. Even though a nuclear power plant is safe, and the critical infrastructure includes a host of security measures, there is a risk of a meltdown. Still, the company continues to operate the plant. What type of risk management strategy is this?

Question 15 15. In order to protect critical infrastructure, you establish a policy by which devices that are not compliant with security patches are isolated from the network. What type of vulnerability management are you using?

Tell us about yourself

Are you a student or a teacher?

I am a student I am a teacher

Computer Science 330: Critical Infrastructure Security Final Free Practice Test Instructions

Choose your answer to the question and click 'Continue' to see how you did. Then click 'Next Question' to answer the next question. When you have completed the free practice test, click 'View Results' to see your results. Good luck!

Computer Science 330: Critical Infrastructure Security  /  Computer Science Courses
Support