Multiple Choice - Revision.pdf Flashcards
What are examples of Physical Systems in CPS?
A. Generators
B. Valves
C. Relays
D. All of the above
D
Which layer is not part of the Cyber Physical Systems (CPS) architecture?
A. Perception layer
B. Transmission layer
C. Application layer
D. Communication layer
D
In Control Systems, what are the two types, each with its own advantage and disadvantage?
A. Open-loop
B. Closed-loop
C. Feedback
D. Forward
A + B
What is the main reason for using control systems in the context of Automatic control?
A. To create disturbances
B. To maintain the controlled variable at a desired value
C. To avoid external disturbances
D. To complicate the process
B
What are the three operational zones in Industrial Control Systems (ICS)?
A. Enterprise zone,
B. Control zone,
C. Field zone
D. Operational zone
A. Enterprise zone,
B. Control zone,
C. Field zone
Which of the following is not an ICS component?
A. Programmable logic controller (PLC)
B. Data scientist
C. Human machine interface (HMI)
D. Communication gateway
B
What model is similar to TCP/IP or OSI models but for ICS security?
Purdue model
Which is not a type of ICS?
A. Process Control System
B. Safety Instrumented System (SIS)
C. Building Automation System
D. Internet of Things (IoT)
D
What are typical ICS protocols?
A. RS-232 and RS-485
B. Modbus
C. HART
D. All of the above
D
What is the Modbus function code used for?
A. Identifying slaves
B. Performing actions
C. Calculating CRC/LRC
D. Modulating TCP
B
What Modbus data type is used for 1-bit data that can be read/written by a client?
A. Inputs
B. Coils
C. Input register
D. Holding register
B
What Modbus data type is used for 1-bit data that can only be read by a client and is altered by I/O?
A. Inputs
B. Coils
C. Input register
D. Holding register
A
What Modbus data type is used for 16-bit data that can only be read by a client and is controlled by I/O?
A. Inputs
B. Coils
C. Input register
D. Holding register
C
What Modbus data type is used for 16-bit data that can only be read/written by a client and is controlled by I/O?
A. Inputs
B. Coils
C. Input register
D. Holding register
D
What is a characteristic of attacks on the perception execution layer?
A. Actuator enablement attacks (AE-attacks)
B. Actuator disablement attacks (AD-attacks)
C. Sensor erasure attack (SE-attacks)
D. All of the above
D
Which attack is related to the communication path between the sensor and the controller?
A. DoS attack
B. Stale data attack
C. Actuator enablement attack
D. ARP poisoning
B
Which is a challenge of CPS security?
A. Reduced performance
B. Higher power consumption
C. Compatibility issues
D. All of the above
D
Which is a main CPS security solution?
A. Cryptographic-based solutions
B. Non-cryptographic-based solutions
C. Both A and B
D. None of the above
C
What is the defense-in-depth strategy in cybersecurity?
A. Holistic protection
B. Single layer defense
C. Layering defense on the same layer
D. Overlapping defense on the same layer
A
Why may the addition of a new security defense pose safety concerns in CPS?
A. It may violate safety certifications
B. It increases system efficiency
C. It enhances performance
D. It decreases transmission delay
A
Which type of attack can lead to an unsafe state in the CPS?
A. Actuator insertion attack
B. Sensor insertion attack
C. Actuator erasure attack
D. Sensor erasure attack
D
What is a challenge of the adoption of security measures in CPS?
A. Reduced performance
B. Higher power consumption
C. Compatibility issues
D. All of the above
D
What is the purpose of network protocols in ICS security?
A. Simplify the integration of controls
B. Provide support for IT protocols
C. Facilitate real-time performance demands
D. All of the above
C
How do high-availability requirements impact security updates/patching in ICS?
A. Increase the risk of cyber attacks
B. Require frequent unscheduled downtime
C. Allow immediate installation of patches
D. Often necessitate waiting until scheduled maintenance/outage period
D