Inst ToolsInst ToolsInst Tools
  • Courses
  • Automation
    • PLC
    • Control System
    • Safety System
    • Communication
    • Fire & Gas System
  • Instrumentation
    • Design
    • Pressure
    • Temperature
    • Flow
    • Level
    • Vibration
    • Analyzer
    • Control Valve
    • Switch
    • Calibration
    • Erection & Commissioning
  • Interview
    • Instrumentation
    • Electrical
    • Electronics
    • Practical
  • Q&A
    • Instrumentation
    • Control System
    • Electrical
    • Electronics
    • Analog Electronics
    • Digital Electronics
    • Power Electronics
    • Microprocessor
Search
  • Books
  • Software
  • Projects
  • Process
  • Tools
  • Basics
  • Formula
  • Power Plant
  • Root Cause Analysis
  • Electrical Basics
  • Animation
  • Standards
  • 4-20 mA Course
  • Siemens PLC Course
Reading: Cyber Security Multiple Choice Questions and Answers
Share
Notification Show More
Font ResizerAa
Inst ToolsInst Tools
Font ResizerAa
  • Courses
  • Design
  • PLC
  • Interview
  • Control System
Search
  • Courses
  • Automation
    • PLC
    • Control System
    • Safety System
    • Communication
    • Fire & Gas System
  • Instrumentation
    • Design
    • Pressure
    • Temperature
    • Flow
    • Level
    • Vibration
    • Analyzer
    • Control Valve
    • Switch
    • Calibration
    • Erection & Commissioning
  • Interview
    • Instrumentation
    • Electrical
    • Electronics
    • Practical
  • Q&A
    • Instrumentation
    • Control System
    • Electrical
    • Electronics
    • Analog Electronics
    • Digital Electronics
    • Power Electronics
    • Microprocessor
Follow US
All rights reserved. Reproduction in whole or in part without written permission is prohibited.
Inst Tools > Blog > Control Systems > Cyber Security Multiple Choice Questions and Answers

Cyber Security Multiple Choice Questions and Answers

In this article, you will find the industrial control system (ICS) cyber security multiple choice questions and answers (MCQ).

Last updated: May 28, 2024 3:28 pm
Editorial Staff
Control Systems
No Comments
Share
6 Min Read
SHARE

In this article, you will find the industrial control system (ICS) cyber security multiple choice questions and answers (MCQ).

Cyber Security Multiple Choice Questions

Cyber Security Multiple Choice Questions and Answers

The below list provides the objective questions related to the cybersecurity of the IACS system.

Answers are available at the bottom of the article.

1. What is IPS?

A)Intrusion Protection System
B)Instrumentation Protection System
C)Intrusion Patching System
D)Intrusion Prevention System

2. Which of the statements is/are correct?

A)Use of cryptography can add latency in network
B)Cryptography can provide confidentiality and integrity to data
C)Use of cryptography can support data security
D)All of these answers

3. How many foundational requirements are stated in 62443?

A)8
B)4
C)3
D)7

4. Which cyberattack happened by hacking the radio communication?

A)Colonial Pipeline
B)New York Dam
C)Maroochy Shire
D)Worcester Air Traffic

5. What are four major essential components of network security?

A)IPS, Firewall, NAC, SIEM
B)IPS, Network Switch, SIEM, IDS
C)Router, IDS, NAC, HMI
D)IDS, IPS, Server, Router

6. Which one is not an SIS System?

A)VAV Box
B)Fire & Gas Systems (FGS)
C)Emergency Shut down (ESD)
D)Process Safety Shutdown (PSS)

7. Which of the following technologies are being used for secure remote access?

A)NAC
B)All of these answers
C)SSL VPN
D)PAM
E)IPSEC VPN

8. Which one of the following is not an endpoint protection technology?

A)Anti-Virus
B)XDR
C)EDR
D)SIEM

9. What components we can secure by implementing cybersecurity controls on it directly?

A)Firewalls
B)Optical Patch Panel
C)HMI
D)Historian

10. Conversion of Cypher text to plain text?

A)Simple Text
B)Decryption
C)Encryption
D)None of these answers

11. Industroyer malware was used for which cyberattack?

A)Ukrainian Power Grid
B)German Steel Mill Attack
C)Colonial Pipeline
D)New York Dam

12. Which one is not a foundational requirement as per IEC 62443?

A)Resource Unavailability
B)Use Control
C)Data Confidentiality
D)Restricted Data Flow

13. Which of the statements is correct in the context of IPS and IDS?

A)IDS can be implemented in line
B)IDS uses SPAN traffic
C)IPS uses SPAN traffic
D)IPS can be implemented in the bypass line

14. What are the types of IDS based on the type of detection and implementation?

A)HIDS & NIDS
B)Signature Based
C)Anomaly Based
D)All of these answers

15. Which of the following is not a network discovery protocol?

A)LDAP
B)LLDP
C)ICMP
D)SNMP

16. What are the benefits of segmentation?

A)Improve Operational Performance
B)Limit Cyberattack Damage
C)Protect Vulnerable Devices
D)Reduce the scope of compliance
E)All of these answers

17. Which is incorrect from the following statement in context to resource availability?

A)By resource availability, we can remove the single point of failure.
B)DoS attacks on the control system doesn’t impact its availability.
C)Redundancy ensures that the system can operate in case of DoS attacks.
D)Ensuring backup systems is also part of resource availability

18. Which devices or technologies are used for segmentation?

A)Virtual Local Area Networks
B)All of these answers
C)Firewalls
D)Unidirectional Gateways

19. What is correct in context to SIEM?

A)Security information and management
B)Security intimation and event management
C)Security information and event management
D)Security event management

20. What is the correct sequence for identification and authentication?

A)Authorization> Authentication> Identification
B)Authorization >Identification> Authentication
C)Identification>Authorization>Authentication
D)Identification> Authentication>Authorization

21. Which one is correct in terms of the functionalities of SIEM?

A)Correlation
B)Retention
C)All of these answers
D)Incident Response
E)Alerting

22. What are the reasons that cause security problems in control system architectures?

A)Increasing dependency on automation and control systems.
B)All of these answers
C)Insecure connectivity to external networks
D)Usage of technologies with known vulnerabilities.

23. Which one is incorrect?

A)In IT Systems reboot is not acceptable
B)In OT fault tolerance is essential.
C)IT systems have confidentiality and integrity as a priority
D)OT Systems are time critical

24. A hacker guessing the suggested password to a program is called as?

A)Password guessing
B)Dictionary Attack
C)Default password attack
D)None of these answers

25. Which one of the following is not a DCS:

A)SPPA-T3000
B)Siemens S7
C)Delta V
D)Honeywell Experion

Click Here for Answers

If you liked this article, then please subscribe to our YouTube Channel for Electrical, Electronics, Instrumentation, PLC, and SCADA video tutorials.

CyberSecurity Course for Beginners (Electrical and Instrumentation Automation)

You can also follow us on Facebook and Twitter to receive daily updates.

Next Quiz:

  • Measuring Instruments Questions
  • Distributed Control System Questions
  • Instrumentation and Control Questions
  • Circuit Protection Devices Questions
  • Transducers Multiple Choice Questions
Don't Miss Our Updates
Be the first to get exclusive content straight to your email.
We promise not to spam you. You can unsubscribe at any time.
Invalid email address
You've successfully subscribed !

Continue Reading

How to Solve Electrical Ground Loop Problems?
Fault in the Temperature Loop
What is Electromagnetic Noise Interference?
Configuration of Control Valve in Studio 5000
Industrial Automation System Architecture Reference Model
PID Controller Gains Effect on Manipulated Variable
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link
Share
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

128.3kFollowersLike
69.1kFollowersFollow
208kSubscribersSubscribe
38kFollowersFollow

Categories

Explore More

VFD Simulator Download – Free Yaskawa V1000 Software
Read Gas Composition from Gas Metering System using RS485 Protocol
Process Control & Safety Systems Logics Implementing Cycle
What is Loop Checking?
What is Override Control? – Need & Applications
Overview of PID Control terms
PID Controller Loop Tuning Questions and Answers – Part 2
Free PID Controller Gains Tuning Tool

Keep Learning

Basic Control Systems Questions

14 Basic Control Systems Questions for Interview Preparation

Yokogawa DCS CPU

System Cabinet Health Checks – PLC and DCS Industrial Automation

Open Loop Control Block Diagram

Self-regulating Processes – Liquid Flow Control

Digital Output Card With Relay and Wet Contact

Wiring Diagrams of PLC and DCS Systems – DI, DO, AI, AO

Explain how this is an example of Ratio Control?

Questions on Ratio Control System

EcoStruxure Machine Expert - HVAC - Programming Software

How to Write a Program in Ecostruxure Machine Expert HVAC Software?

Example of feedback principle

Example of Feedback System

Sources of Static Grounding and Methods to Control

Sources of Static Grounding and Methods to Control

Learn More

Scaling in PLC

How to do Scaling for Analog Input in RSLogix 500?

high-accuracy voltmeter

Electrical Standards

kirchhoffs-voltage-law

What is Kirchhoff’s Voltage Law

PLC Program for Conveyor System

PLC Conveyor Ladder Logic Program

Burst Transformers Root Cause Analysis

Burst Transformer – Electrical Problem Solved

PLC Program for Filling Operation

PLC Program for Continuous Filling Operation

Process Control Instrumentation Objective Questions

Process Control Instrumentation Quiz

PID Controllers with output high select Logic

PID Controllers with Output High Select Logic

Follow US
All rights reserved. Reproduction in whole or in part without written permission is prohibited.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?