Copyright

Industrial Network Security & Threats Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. What does the belief of Security in Size entail?

Question 2 2. What principle does Security Through Obscurity follow?

Question 3 3. Which of the following best describes what an APT is?

Question 4 4. What is the main difference between APTs and cyber warfare?

Question 5 5. Botnets are a kind of malware which are used to _____.

Page 2

Question 6 6. Weaponized malware _____.

Question 7 7.

Which of the following are major reasons for security lapses of industrial systems?

i) IT team's visibility of the industrial network

ii) Lack of security in legacy systems and devices

iii) Long delays in applying security patches in the network

iv) Stringent threat assessment process

Question 8 8. The vulnerability window is _____.

Question 9 9. What organization first coined the term hacktivism?

Question 10 10. Doxxing is _____.

Page 3

Question 11 11. What is one of the principles of Secure Operations Technology?

Question 12 12. What are the types of attacks that may happen in industrial networks?

Question 13 13. Hacking involves activities practiced by individuals, organizations, and _____ in order to gain unauthorized access into computer and technology dependent systems.

Question 14 14. Which one of the following does NOT prevent hacking?

Question 15 15. _____ is restricting access so that nobody knows everything, and nobody can access everything.

Page 4

Question 16 16. A _____ is one that originates internally.

Question 17 17. What kind of files do advanced persistent threats frequently hide as?

Question 18 18. Which of these may classify as an odd grouping worthy of your attention?

Question 19 19. Which of the following is a characteristic of cyber crime?

Question 20 20. Which of the following is NOT something you can do to reduce the risk of cyber crime on your system?

Page 5

Question 21 21. Which of the following attack methods involves an attacker sending targeted emails which contain specialized malware to high-level individuals?

Question 22 22. Which of the following is NOT a consequence faced by the target of a successful cyber attack?

Question 23 23. Which of the following is designed to handle vast amounts of data that is typically seen in large companies and can involve different types of equipment and devices, such as field devices, controllers, and computers?

Question 24 24. Which of the following is responsible for bringing down Ukraine's power grid in 2015?

Question 25 25. What is a Spray and Pray cyber security attack?

Page 6

Question 26 26. What is the name of the attack campaign which targeted large U.S.-based companies such as Google, Adobe, and Rackspace?

Question 27 27. Deployment of dedicated end point protection systems will help an organization to detect and thwart any attempt of cyberattack on its industrial systems. At which end points in an industrial network are such systems deployed?

Question 28 28.

Industrial networks are exposed to cyber threats. Which of the below reasons are correct?

i) They were built before the internet era and security risk was not considered while building them.

ii) Due to business need, industrial networks are connected to IT network and thus are exposed to cyber threats.

iii) They are separated from the outside network.

iv) They use legacy software and proprietary communication protocols.

Question 29 29. What is hacktivism?

Question 30 30. How can a physical attack be prevented?

Industrial Network Security & Threats Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 330: Critical Infrastructure Security  /  Computer Science Courses
Support