Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1) Except for one of the below, there are four areas of SCADA controls in which further development is needed to improve its current state

1)

Except for one of the below, there are four areas of SCADA controls in which further development is needed to improve its current state of the art.

Group of answer choices

Monitoring and detection controls through firewalls and intrusion detection systems should be set-up to ensure access policy compliance and detect suspicious behaviors.

Enhancing SCADA protocols and strengthening networks with cryptography using secure-software design principles.

The weakest points to consider for security SCADA are communications that should be improved to reduce costs and increase efficiency.

Typical threats and vulnerabilities to SCADA systems are identified and security countermeasures are recommended to mitigate the associated risks.

Depending on the levels of information classification and range of risks, it should affect current security classification of their overlying infrastructures as critical.

2)

Except for one of the below, inter-dependencies exist in four forms:

Group of answer choices

Bidirectional

Physical

Cyber

Geographic

Logical

3)

Frank DiGiovanni identified a series of core attributes needed to be successful in cybersecurity, except for:

Group of answer choices

Prestige seeking

Passionately curious

Ability to be self-taught

Follow the status quo

4)

SCADA systems are important elements of CII and these three current safeguards of ICT can be applied to protect them.

Group of answer choices

Hardware, Software, Network

ISO, NIST, COBIT

Policies, Standards, Procedures

Technology, Policy/Practice, People

5)

According to the State of California's Energy Department, the Smart Grid has the following characteristics, except for:

Group of answer choices

Reduce the use of burning coal for producing electricity

Enabling active participation by consumers in demand response

Self-healing from power disturbance events

Operating resiliently against physical and cyber attack

6)

The trifecta for multifactor authentication includes the following, except for:

Group of answer choices

Something you know

Something you see

Something you have

Something you know

7)

In September 2018, Governor Jerry Brown signed SB-327 requiring that by 1/1/20, manufacturing of devices sold in California must implement:

Group of answer choices

Trackable asset tag information

Regulation 500

A certificate of financial responsibility

Reasonable security features

8)

There are four areas of security controls in which further development is needed to improve SCADA security, except for:

Group of answer choices

Information classication.

Communications that should be improved to reduce costs and increase eciency.

Enhancing protocols and strengthening networks with cryptography using secure-software design principles.

Data retention guidelines.

9)

The U.S. electricity industry has been operated for decades, from the market perspective, as a _____________ of vertical integrated utilities (VIU) that owned and managed the generation, transmission, and distribution of power.

10)

The use of open standards and open web protocols (HTML, HTTP, HTTPS) can also significantly reduce costs in terms of hardware and software, time, personnel and field operations.

Group of answer choices

True

False

11)

According to the AP investigation article, in the attack involving the Calpine Corp., the hackers got the following, except for:

Group of answer choices

User names and passwords

Detailed engineering drawings

Internet protocol addresses

Disgrams showing how local plants transmit information

12)

The Fifth Domains five no so easy pieced includes all but:

Group of answer choices

Air gap control networks from the Internet.

Put someone in charge with real authority

Have a plan B

Prepare for the worst

13) In an electricity distribution system, the _______ systems take the high voltage electricity and reduces the voltage so it can be consumed by electricity users.

14) A ________ is a critical infrastructure responsible for distributing and efficiently managing renewable energy to end-users.

15)

One of the first initiatives launched by the Obama administration to address our cyber insecurities was the:

Group of answer choices

Multi-factor authentication

National strategy for trusted identities in cyberspace

National Institute for Standards and Technology

Homeland Security Presidential Directive 12

16)

Power Systems rely heavily on the underlying ICT network layer. Attacks against switches, routers, and networks would not have serious impact on the efficiency and on the control functionality.

Group of answer choices

True

False

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Inference Control In Statistical Databases From Theory To Practice Lncs 2316

Authors: Josep Domingo-Ferrer

2002nd Edition

3540436146, 978-3540436140

More Books

Students also viewed these Databases questions

Question

6. Identify seven types of hidden histories.

Answered: 1 week ago

Question

What is human nature?

Answered: 1 week ago