Copyright

Implementing Secure Zones & Conduits in Industrial Networks Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. A red team exercise is:

Question 2 2. It is important to have a lockable memory socket for the PCL SD because:

Question 3 3. Programmable logic controllers (PLCs) are problematic because:

Question 4 4. Physical security of SCADA systems includes:

Question 5 5. SCADA stands for

Page 2

Question 6 6. A security conduit _____.

Question 7 7. HMI is _____.

Question 8 8. Physical proximity is _____.

Question 9 9. Determining the level of trust required for accessing an asset is _____.

Question 10 10. Firewalls are _____.

Page 3

Question 11 11. What common characteristic is NOT required for a specific security zone?

Question 12 12. Name a common security zone couple (two different security zones) in industrial networks.

Question 13 13. Security zones _____.

Question 14 14. Conduits are usually described as _____.

Question 15 15. Security zones contain users _____.

Page 4

Question 16 16. What is meant by a granular zoning method?

Question 17 17. What does a demilitarized zone (DMZ) usually include?

Question 18 18. What does a proxy methodology NOT involve?

Question 19 19. What is meant by one-way communication?

Question 20 20. Name an example of access control methodology/implementation.

Page 5

Question 21 21. _____ is the physical or logical isolation of one or more layers within a security zone.

Question 22 22. Within each security zone, there is a level of _____ that allows for the sharing of resources and communication between a higher level security zone and a lower level security zone.

Question 23 23. A/An _____ is the internal network of an organization that is secured behind one or more firewalls and has a medium level of restrictions with certain controls in place to monitor network traffic.

Question 24 24. A/An _____ zone is a highly controlled zone that must not have any type of access to an un-trusted zone.

Question 25 25. A/An _____ is a subnetwork of an organization's network, which can be physical or logical, that allows access to an un-trusted zone, such as the internet, but cannot reach back to the internal network system.

Implementing Secure Zones & Conduits in Industrial Networks Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 330: Critical Infrastructure Security  /  Computer Science Courses
Support