Module 3: Technologies

Assessment

True/False

Indicate whether the statement is true or false.

 

____ 1. Unlike IT systems, ICS places more importance on availability than they do to confidentiality.

 

____ 2. Stateless firewalls examine each packet and make a determination about whether or not the packet is allowed based on context.

 

____ 3. IPv6 is an improvement over IPv4  in its ability to support encryption, authentication, and longer address space.

Multiple Choice

Identify the choice that best completes the statement or answers the question.

 

____ 4. Which of the following is not an element of Operational Technology?

  • a. Event driven architecture
  • b. Process transactions, provide information
  • c. Consists of electromechanical, sensors, actuators, coded displays, hand-held devices
  • d. Controls machines, rather than provides support to people

 

____ 5. Which of the following is not a major component of an ICS network?

  • a. Fieldbus Network
  • b. Remote Access Points
  • c. Communications routers
  • d.  File server

 

____ 6. Which of the following is not an open communication protocol?

  • a. Modbus
  • b. Fieldbus
  • c. DNP3
  • d. HART

Completion

Complete each statement.

 

7. A ______  network is an industrial network system connecting instruments, sensors, and other devices to a PLC or controller.

 

8. ____________  was created in 1979 as a communications protocol for use with PLCs and is now a defacto standard.

Matching

Match the major component of an ICS to its function.

  • a. Control Server
  • b. SCADA Server or Master Terminal Unit (MTU)
  • c. Remote Terminal Unit (RTU)
  • d. Programmable Logic Controller (PLC)
  • e. Intelligent Electronic Devices (Sensors/Actuators)
  • f. Human-Machine Interface (HMI)
  • g. Data Historian
  • h. Input/Output (I/O) Server

 

____ 9. Controllers used at the field level

 

____ 10. Hosts DCS or PLC software

 

____ 11. Software and hardware used by a person to monitor the state of the process and manage the settings

 

____ 12. devices that convert physical properties to an electronic signal and then perform a physical action

 

____ 13. Device that collects, buffers, and provides access to information on subcomponents

 

____ 14. Master in a SCADA system

 

____ 15. Centralized database that logs information received from ICS devices

 

____ 16. Special purpose data acquisition and control unit device

Short Answer

17. Address some of the potential challenges with ICS devices.

 

18. Identify some “best practices” in securing critical infrastructure and key resources (CIKR).

 

19. Discuss some “best practices” with ICS firewall designs.

 

License

Icon for the Creative Commons Attribution 4.0 International License

Critical Infrastructure Systems by NCyTE Center is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book