Question
1) Except for one of the below, there are four areas of SCADA controls in which further development is needed to improve its current state
1)
Except for one of the below, there are four areas of SCADA controls in which further development is needed to improve its current state of the art.
Group of answer choices
Monitoring and detection controls through firewalls and intrusion detection systems should be set-up to ensure access policy compliance and detect suspicious behaviors.
Enhancing SCADA protocols and strengthening networks with cryptography using secure-software design principles.
The weakest points to consider for security SCADA are communications that should be improved to reduce costs and increase efficiency.
Typical threats and vulnerabilities to SCADA systems are identified and security countermeasures are recommended to mitigate the associated risks.
Depending on the levels of information classification and range of risks, it should affect current security classification of their overlying infrastructures as critical.
2)
Except for one of the below, inter-dependencies exist in four forms:
Group of answer choices
Bidirectional
Physical
Cyber
Geographic
Logical
3)
Frank DiGiovanni identified a series of core attributes needed to be successful in cybersecurity, except for:
Group of answer choices
Prestige seeking
Passionately curious
Ability to be self-taught
Follow the status quo
4)
SCADA systems are important elements of CII and these three current safeguards of ICT can be applied to protect them.
Group of answer choices
Hardware, Software, Network
ISO, NIST, COBIT
Policies, Standards, Procedures
Technology, Policy/Practice, People
5)
According to the State of California's Energy Department, the Smart Grid has the following characteristics, except for:
Group of answer choices
Reduce the use of burning coal for producing electricity
Enabling active participation by consumers in demand response
Self-healing from power disturbance events
Operating resiliently against physical and cyber attack
6)
The trifecta for multifactor authentication includes the following, except for:
Group of answer choices
Something you know
Something you see
Something you have
Something you know
7)
In September 2018, Governor Jerry Brown signed SB-327 requiring that by 1/1/20, manufacturing of devices sold in California must implement:
Group of answer choices
Trackable asset tag information
Regulation 500
A certificate of financial responsibility
Reasonable security features
8)
There are four areas of security controls in which further development is needed to improve SCADA security, except for:
Group of answer choices
Information classication.
Communications that should be improved to reduce costs and increase eciency.
Enhancing protocols and strengthening networks with cryptography using secure-software design principles.
Data retention guidelines.
9)
The U.S. electricity industry has been operated for decades, from the market perspective, as a _____________ of vertical integrated utilities (VIU) that owned and managed the generation, transmission, and distribution of power.
10)
The use of open standards and open web protocols (HTML, HTTP, HTTPS) can also significantly reduce costs in terms of hardware and software, time, personnel and field operations.
Group of answer choices
True
False
11)
According to the AP investigation article, in the attack involving the Calpine Corp., the hackers got the following, except for:
Group of answer choices
User names and passwords
Detailed engineering drawings
Internet protocol addresses
Disgrams showing how local plants transmit information
12)
The Fifth Domains five no so easy pieced includes all but:
Group of answer choices
Air gap control networks from the Internet.
Put someone in charge with real authority
Have a plan B
Prepare for the worst
13) In an electricity distribution system, the _______ systems take the high voltage electricity and reduces the voltage so it can be consumed by electricity users.
14) A ________ is a critical infrastructure responsible for distributing and efficiently managing renewable energy to end-users.
15)
One of the first initiatives launched by the Obama administration to address our cyber insecurities was the:
Group of answer choices
Multi-factor authentication
National strategy for trusted identities in cyberspace
National Institute for Standards and Technology
Homeland Security Presidential Directive 12
16)
Power Systems rely heavily on the underlying ICT network layer. Attacks against switches, routers, and networks would not have serious impact on the efficiency and on the control functionality.
Group of answer choices
True
False
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started