Copyright

Monitoring the Security of Industrial Networks Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. What does a Subnet Mask provide?

Question 2 2. What information is carried in the IP Address?

Question 3 3. What are the 2 main problems resolved via Network Segmentation?

Question 4 4. Dropping _____ refers to eliminating pieces of malicious data trying to be delivered to a network.

Question 5 5. If an intrusion prevention system identifies malicious traffic trying to enter a computer network, which of these steps might it take?

Page 2

Question 6 6. How does an intrusion prevention system differ from an intrusion detection system?

Question 7 7. Which of the following is NOT something a network security audit looks at?

Question 8 8. Which of the following is a characteristic of network security?

Question 9 9. Which of the following potential threats involves revealing important information?

Question 10 10. Which of the following network security threats concerns unexplained failures?

Page 3

Question 11 11. Which of the following is NOT considered a network security threat?

Question 12 12. Which of the following describes network security?

Question 13 13. Why would you want to implement a controls framework like COBIT?

Question 14 14. Which of the following is NOT an intention of a control framework?

Question 15 15. Which of the following is an example of a logical control?

Page 4

Question 16 16. Which step of the component selection process involves meeting with management and field workers to gain a better understanding of how each component is used in the overall production process?

Question 17 17. Mapping the current infrastructure involves what?

Question 18 18. Why is it important to determine which components in an industrial system should be monitored?

Question 19 19. Which of the following is NOT a method for intrusion detection?

Question 20 20. Which of the following is NOT a characteristic of an intrusion detection system?

Page 5

Question 21 21. Which of the following intrusion detection methods deals with known patterns or attributes?

Question 22 22. Two of the first steps in developing a network security policy are:

Question 23 23. An example of an internal network security threat is:

Question 24 24. A/An _____ specifies proper utilization of company computer resources and how to protect private information.

Question 25 25. Which management guru made a significant contribution to quality management and continual improvement techniques?

Page 6

Question 26 26. What role do tolerance limits play in continual improvement?

Question 27 27. What does ISO9001 say about continual improvement?

Question 28 28. Where is the subnet address contained?

Question 29 29. Where is an intrusion prevention system located in a computer network?

Question 30 30. Which of the following network security audit tools is a suite, not a utility?

Monitoring the Security of Industrial Networks Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 330: Critical Infrastructure Security  /  Computer Science Courses
Support