Identifying & Classifying Security Zones in Critical Infrastructure: Process & Examples


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

SCADA stands for

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. A red team exercise is:

2. Physical security of SCADA systems includes:

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

The compromise of critical infrastructure through a cyber incident could have devastating and lasting consequences. Identifying and managing risks is of utmost importance. You will be quizzed on SCADA and protection methods.

Quiz & Worksheet Goals

This quiz will test you on the following topics:

  • The meaning of SCADA
  • Description of a red team exercise
  • SCADA physical security component
  • The problem with programmable logic controllers
  • Why a PLC SD should have a lockable memory socket

Skills Practiced

  • Defining key concepts- ensure that you can accurately define a red team exercise
  • Information recall- access the knowledge you've gained regarding SCADA
  • Knowledge application- use your knowledge to answer a question about a PLC

Additional Learning

To learn more about security zone identification and classification in critical infrastructures, review the accompanying lesson called Identifying & Classifying Security Zones in Critical Infrastructure: Process & Examples. This lesson addresses the following:

  • Why protection of critical infrastructure is so important
  • A real-world example of what can happen if security is compromised
  • Methods used to find weaknesses in infrastructure and evaluate defensive measures
  • Ways to shore up vulnerabilities in programmable logic controllers (PLCs)