Cyber Security Multiple Choice Questions and Answers

In this article, you will find the industrial control system (ICS) cyber security multiple choice questions and answers (MCQ).

Cyber Security Multiple Choice Questions

Cyber Security Multiple Choice Questions and Answers

The below list provides the objective questions related to the cybersecurity of the IACS system.

Answers are available at the bottom of the article.

1. What is IPS?

A)Intrusion Protection System
B)Instrumentation Protection System
C)Intrusion Patching System
D)Intrusion Prevention System

2. Which of the statements is/are correct?

A)Use of cryptography can add latency in network
B)Cryptography can provide confidentiality and integrity to data
C)Use of cryptography can support data security
D)All of these answers

3. How many foundational requirements are stated in 62443?

A)8
B)4
C)3
D)7

4. Which cyberattack happened by hacking the radio communication?

A)Colonial Pipeline
B)New York Dam
C)Maroochy Shire
D)Worcester Air Traffic

5. What are four major essential components of network security?

A)IPS, Firewall, NAC, SIEM
B)IPS, Network Switch, SIEM, IDS
C)Router, IDS, NAC, HMI
D)IDS, IPS, Server, Router

6. Which one is not an SIS System?

A)VAV Box
B)Fire & Gas Systems (FGS)
C)Emergency Shut down (ESD)
D)Process Safety Shutdown (PSS)

7. Which of the following technologies are being used for secure remote access?

A)NAC
B)All of these answers
C)SSL VPN
D)PAM
E)IPSEC VPN

8. Which one of the following is not an endpoint protection technology?

A)Anti-Virus
B)XDR
C)EDR
D)SIEM

9. What components we can secure by implementing cybersecurity controls on it directly?

A)Firewalls
B)Optical Patch Panel
C)HMI
D)Historian

10. Conversion of Cypher text to plain text?

A)Simple Text
B)Decryption
C)Encryption
D)None of these answers

11. Industroyer malware was used for which cyberattack?

A)Ukrainian Power Grid
B)German Steel Mill Attack
C)Colonial Pipeline
D)New York Dam

12. Which one is not a foundational requirement as per IEC 62443?

A)Resource Unavailability
B)Use Control
C)Data Confidentiality
D)Restricted Data Flow

13. Which of the statements is correct in the context of IPS and IDS?

A)IDS can be implemented in line
B)IDS uses SPAN traffic
C)IPS uses SPAN traffic
D)IPS can be implemented in the bypass line

14. What are the types of IDS based on the type of detection and implementation?

A)HIDS & NIDS
B)Signature Based
C)Anomaly Based
D)All of these answers

15. Which of the following is not a network discovery protocol?

A)LDAP
B)LLDP
C)ICMP
D)SNMP

16. What are the benefits of segmentation?

A)Improve Operational Performance
B)Limit Cyberattack Damage
C)Protect Vulnerable Devices
D)Reduce the scope of compliance
E)All of these answers

17. Which is incorrect from the following statement in context to resource availability?

A)By resource availability, we can remove the single point of failure.
B)DoS attacks on the control system doesn’t impact its availability.
C)Redundancy ensures that the system can operate in case of DoS attacks.
D)Ensuring backup systems is also part of resource availability

18. Which devices or technologies are used for segmentation?

A)Virtual Local Area Networks
B)All of these answers
C)Firewalls
D)Unidirectional Gateways

19. What is correct in context to SIEM?

A)Security information and management
B)Security intimation and event management
C)Security information and event management
D)Security event management

20. What is the correct sequence for identification and authentication?

A)Authorization> Authentication> Identification
B)Authorization >Identification> Authentication
C)Identification>Authorization>Authentication
D)Identification> Authentication>Authorization

21. Which one is correct in terms of the functionalities of SIEM?

A)Correlation
B)Retention
C)All of these answers
D)Incident Response
E)Alerting

22. What are the reasons that cause security problems in control system architectures?

A)Increasing dependency on automation and control systems.
B)All of these answers
C)Insecure connectivity to external networks
D)Usage of technologies with known vulnerabilities.

23. Which one is incorrect?

A)In IT Systems reboot is not acceptable
B)In OT fault tolerance is essential.
C)IT systems have confidentiality and integrity as a priority
D)OT Systems are time critical

24. A hacker guessing the suggested password to a program is called as?

A)Password guessing
B)Dictionary Attack
C)Default password attack
D)None of these answers

25. Which one of the following is not a DCS:

A)SPPA-T3000
B)Siemens S7
C)Delta V
D)Honeywell Experion

Click Here for Answers

If you liked this article, then please subscribe to our YouTube Channel for Electrical, Electronics, Instrumentation, PLC, and SCADA video tutorials.

You can also follow us on Facebook and Twitter to receive daily updates.

Next Quiz:

Don't Miss Our Updates
Be the first to get exclusive content straight to your email.
We promise not to spam you. You can unsubscribe at any time.
Invalid email address

Leave a Comment

Share via
Follow us and never miss an update!