Professional Documents
Culture Documents
1. A
2. B
3. C
4. D
1. It has 4 layers.
3. Data is encapsulated and moved to lower layer and de-encapsulated and moved to upper layer.
4. Data is de-encapsulated and moved to lower layer and encapsulated and moved to upper layer.
Question 3 : Which of the following is not an automation and control communication protocol?
1. Modbus
2. CANbus
3. LANbus
4. Profibus
4. Both 1 and 2
1. OPC-HDA
2. OPC-HA
3. OPC-DA
4. OPC-AE
1. Integrated security
2. Multi-platform compatibility
3. Scalable
4. Deterministic
Question 7 : Which underlying protocol does Controller Area Network protocol use?
Question 8 : Ethernet/IP is a ?
3. Coils Only
1. Boolean
2. String
3. DateTime
4. Register
2. Authentication is allowing the person to perform given jobs and authorization is identifying
the person.
1. the entity must go through a valid authorization process that can be circumvented
2. the entity must go through a valid authorization process that cannot be circumvented
3. the entity need not go through a valid authorization process that cannot be circumvented
4. the entity must go through a valid authentication process that cannot be circumvented
1. Guidelines
2. Procedures
3. Policies
4. Standards
1. Network layer
2. Application layer
4. Transport layer
Question 18: What is the minimum number of cryptographic keys required for secure two way
communication in Symmetric Key Cryptography?
1. One
2. Two
3. Three
4. Four
Question 19: How many keys are required to fully implement a symmetric algorithm with 10
participants?
1. 10
2. 20
3. 45
4. 100
Question 20: What cannot be achieved through Secret / Symmetric key cryptography ?
1. Non Repudiation
2. Confidentiality
3. Integrity
4. Key Distribution
Question 21 : How many encryption keys are required to fully implement an asymmetric algorithm with
10 participants?
1. 10
2. 20
3. 30
4. 100
Question 22: Richard received an encrypted message sent to him from Sue. Which key should he use to
decrypt the message?
Question 23: An attack that overloads the resources of a computing system is an attack against which of
the following?
1. Integrity
2. Availability
3. Confidentiality
4. Authentication
Question 24: Which of the following items refers to the act of verifying a user’s identity and confirming
that the user is who he or she professes to be?
1. Authentication
2. Authorization
3. Registration
4. Accountability
Question 25: A security control that minimizes the effect of an attack and the degree of resulting
damage is known as which type of control?
1. Corrective
2. Preventive
3. Deterrent
4. Detective
Question 26: The act of establishing numerous layers of protection wherein a subsequent layer will
provide protection if a previous layer is breached is known as which of the following?
1. Defense in depth
2. Complete mediation
3. Least privilege
4. Open design
1. Host-to-host
2. Gateway-to-gateway
3. Host-to-gateway
4. Host-to-demilitarized zone
Question 28: In a typical hierarchal Industrial Control System Structure the top most layer is:
Question 29: For a geographically wide control system framework is normally called:
1. Distributed Control System
2. Wide Area Control system
3. Supervisory Control and Data Acquisition
4. Distributed Programmable Logic Control System
Question 32: Safety Instrumented Systems help risk reduction factor by:
1. Estimating probability of failure of control hardware on demand
2. Estimating probability of failure of the complete control system
3. Estimating probability of failure of meeting the performance objective function of a control
system
4. All of the above
Question 33: Open Safety protocol Verifies data using Cyclic Redundancy Check (CRC) and:
1. Message Encapsulation
2. Message Authentication
3. Message Authorization
4. Message Authentication and Authorization
Question 35: Which one of the following items is NOT a component of a classical
SCADA system model: