Copyright

Policies, Procedures & Standards for ICS & SCADA Systems Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. North American Electric Reliability CIP standards include all EXCEPT:

Question 2 2. Risk management is _____.

Question 3 3. Chemical sector security focuses on _____.

Question 4 4. It is recommended that SCADA systems are _____.

Question 5 5. This is a byproduct of NIST compliance for federal offices:

Page 2

Question 6 6. The NIST Special Publication 800 Series has undergone many revisions. Why?

Question 7 7. Why was the NIST 800 Series first created?

Question 8 8. Which of these subject areas does the well-known NIST 800-53 publication cover?

Question 9 9. Which of the following may NOT happen if the ISA99 standards are compromised?

Question 10 10. Which of the following is FALSE about IEC 62443 standards?

Page 3

Question 11 11. The current co-chairmen of ISA99 are _____.

Question 12 12. Which of these is NOT part of the life cycle for secure design as formulated by IEC 62443?

Question 13 13. A password policy in ICS/SCADA systems dictates _____.

Question 14 14. Topology of systems _____.

Question 15 15. Restrictions to local access _____.

Page 4

Question 16 16. The Air Gap _____.

Question 17 17. A security audit _____.

Question 18 18. NERC CIP is _____.

Question 19 19. Security related to roles and responsibilities _____.

Question 20 20. ISO 27000 is _____.

Page 5

Question 21 21. SHA and AES are _____.

Question 22 22. IDS are known as _____.

Question 23 23. IPS are known as _____.

Question 24 24. A good analogy for defense in depth is _____.

Question 25 25. What is the ISO/IEC 27000 series used for?

Page 6

Question 26 26. Where did the ISO/IEC 27000 series get its start?

Question 27 27. What is the purpose of classifying information security inventory as described by the ISO/IEC 27000 series?

Question 28 28. Who can utilize the ISO/IEC 27000 series?

Question 29 29. When separating an ICS network from the corporate network, which of the following methods can NOT be used?

Question 30 30. The standards and guidelines outlined in the NIST 800 Series are _____ for private companies and organizations.

Policies, Procedures & Standards for ICS & SCADA Systems Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 330: Critical Infrastructure Security  /  Computer Science Courses
Support