Module 3: Technologies
Assessment
True/False
Indicate whether the statement is true or false.
____ 1. Unlike IT systems, ICS places more importance on availability than they do to confidentiality.
____ 2. Stateless firewalls examine each packet and make a determination about whether or not the packet is allowed based on context.
____ 3. IPv6 is an improvement over IPv4 in its ability to support encryption, authentication, and longer address space.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
____ 4. Which of the following is not an element of Operational Technology?
- a. Event driven architecture
- b. Process transactions, provide information
- c. Consists of electromechanical, sensors, actuators, coded displays, hand-held devices
- d. Controls machines, rather than provides support to people
____ 5. Which of the following is not a major component of an ICS network?
- a. Fieldbus Network
- b. Remote Access Points
- c. Communications routers
- d. File server
____ 6. Which of the following is not an open communication protocol?
- a. Modbus
- b. Fieldbus
- c. DNP3
- d. HART
Completion
Complete each statement.
7. A ______ network is an industrial network system connecting instruments, sensors, and other devices to a PLC or controller.
8. ____________ was created in 1979 as a communications protocol for use with PLCs and is now a defacto standard.
Matching
Match the major component of an ICS to its function.
- a. Control Server
- b. SCADA Server or Master Terminal Unit (MTU)
- c. Remote Terminal Unit (RTU)
- d. Programmable Logic Controller (PLC)
- e. Intelligent Electronic Devices (Sensors/Actuators)
- f. Human-Machine Interface (HMI)
- g. Data Historian
- h. Input/Output (I/O) Server
____ 9. Controllers used at the field level
____ 10. Hosts DCS or PLC software
____ 11. Software and hardware used by a person to monitor the state of the process and manage the settings
____ 12. devices that convert physical properties to an electronic signal and then perform a physical action
____ 13. Device that collects, buffers, and provides access to information on subcomponents
____ 14. Master in a SCADA system
____ 15. Centralized database that logs information received from ICS devices
____ 16. Special purpose data acquisition and control unit device
Short Answer
17. Address some of the potential challenges with ICS devices.
18. Identify some “best practices” in securing critical infrastructure and key resources (CIKR).
19. Discuss some “best practices” with ICS firewall designs.