با سلام
سوالات پیش آزمون امنیت سایبری اتوماسیون صنعتی براساس IEC 62443 با کلید واژه ی #ICS در کانال ارسال می شود .
#امنیت_اتوماسیون_صنعتی
#ICS
@mohandesmaher
mohandesmaher.com
سوالات پیش آزمون امنیت سایبری اتوماسیون صنعتی براساس IEC 62443 با کلید واژه ی #ICS در کانال ارسال می شود .
#امنیت_اتوماسیون_صنعتی
#ICS
@mohandesmaher
mohandesmaher.com
1.What is the primary function of a firewall?
#ICS
#ICS
Anonymous Quiz
15%
a.Block all internet traffic
28%
b. Detect network intrusions
30%
c. Filter network traffic
27%
d. Authenticate users
3. The process of securing a system by reducing its attack surface is known as
#ICS
#ICS
Anonymous Quiz
23%
a. Threat Modeling
39%
b. System Hardening
25%
c. Intrusion Detection
13%
d. Whitelisting
4. Policies, procedures and technical controls that govern the use of system resources are known
as:
#ICS
as:
#ICS
Anonymous Quiz
24%
a. Data Flow Controls
22%
b. System Integrity Controls
37%
c. Access Controls
17%
d. System Hardening Controls
Which of the following is an objective of cybersecurity acceptance testing?
#ICS
#ICS
Anonymous Quiz
24%
a. Verification of cybersecurity specifications
30%
b. Root cause analysis c. Cyber risk determination
29%
c. Cyber risk determination
17%
d. Verification of system functionality
8. The desired level of security for a system is known as?
#ICS
#ICS
Anonymous Quiz
34%
a. Target Security Level
9%
b. Achieved Security Level
15%
c. Capability Security Level
42%
d. Protection Level
7. Which of the following is the correct risk equation?
#ICS
#ICS
Anonymous Quiz
16%
a. Risk = Threat x Asset x Consequence
25%
b. Risk = Threat x Vulnerability x Cost
23%
c. Risk = Threat Agent x Threat x Vulnerability
36%
d. Risk = Threat x Vulnerability x Consequence
10. An Intrusion Detection System (IDS) is an example of what method of treating risk?
#ICS
#ICS
Anonymous Quiz
57%
a. Detect
10%
b. Deter
25%
c. Defend
9%
d. Defeat
14. Which of the following represents the recommended process of firewall planning and
implementation?
#ICS
implementation?
#ICS
Anonymous Quiz
34%
a. Plan, Configure, Test, Deploy, Manage
29%
b. Plan, Configure, Deploy, Test, Manage
17%
c. Plan, Deploy, Manage, Test, Configure
20%
d. Design, Configure, Test, Deploy, Document
Which of the following represents the recommended process of firewall planning and
implementation?
#ICS
implementation?
#ICS
Anonymous Quiz
33%
a. Plan, Configure, Test, Deploy, Manage
24%
b. Plan, Configure, Deploy, Test, Manage
15%
c. Plan, Deploy, Manage, Test, Configure
29%
d. Design, Configure, Test, Deploy, Document
What are the main types of intrusion detection systems?
#ICS
#ICS
Anonymous Quiz
28%
a. Perimeter Intrusion Detection & Network Intrusion Detection
37%
b. Host Intrusion Detection & Network Intrusion Detection
22%
c. Host Intrusion Detection & Intrusion Prevention Systems
12%
d. Intrusion Prevention & Network Intrusion Detection