Control Systems

Cyber Security Multiple Choice Questions and Answers

In this article, you will find the industrial control system (ICS) cyber security multiple choice questions and answers (MCQ).

Cyber Security Multiple Choice Questions

Cyber Security Multiple Choice Questions and Answers

The below list provides the objective questions related to the cybersecurity of the IACS system.

Answers are available at the bottom of the article.

1. What is IPS?

A)Intrusion Protection System
B)Instrumentation Protection System
C)Intrusion Patching System
D)Intrusion Prevention System

2. Which of the statements is/are correct?

A)Use of cryptography can add latency in network
B)Cryptography can provide confidentiality and integrity to data
C)Use of cryptography can support data security
D)All of these answers

3. How many foundational requirements are stated in 62443?

A)8
B)4
C)3
D)7

4. Which cyberattack happened by hacking the radio communication?

A)Colonial Pipeline
B)New York Dam
C)Maroochy Shire
D)Worcester Air Traffic

5. What are four major essential components of network security?

A)IPS, Firewall, NAC, SIEM
B)IPS, Network Switch, SIEM, IDS
C)Router, IDS, NAC, HMI
D)IDS, IPS, Server, Router

6. Which one is not an SIS System?

A)VAV Box
B)Fire & Gas Systems (FGS)
C)Emergency Shut down (ESD)
D)Process Safety Shutdown (PSS)

7. Which of the following technologies are being used for secure remote access?

A)NAC
B)All of these answers
C)SSL VPN
D)PAM
E)IPSEC VPN

8. Which one of the following is not an endpoint protection technology?

A)Anti-Virus
B)XDR
C)EDR
D)SIEM

9. What components we can secure by implementing cybersecurity controls on it directly?

A)Firewalls
B)Optical Patch Panel
C)HMI
D)Historian

10. Conversion of Cypher text to plain text?

A)Simple Text
B)Decryption
C)Encryption
D)None of these answers

11. Industroyer malware was used for which cyberattack?

A)Ukrainian Power Grid
B)German Steel Mill Attack
C)Colonial Pipeline
D)New York Dam

12. Which one is not a foundational requirement as per IEC 62443?

A)Resource Unavailability
B)Use Control
C)Data Confidentiality
D)Restricted Data Flow

13. Which of the statements is correct in the context of IPS and IDS?

A)IDS can be implemented in line
B)IDS uses SPAN traffic
C)IPS uses SPAN traffic
D)IPS can be implemented in the bypass line

14. What are the types of IDS based on the type of detection and implementation?

A)HIDS & NIDS
B)Signature Based
C)Anomaly Based
D)All of these answers

15. Which of the following is not a network discovery protocol?

A)LDAP
B)LLDP
C)ICMP
D)SNMP

16. What are the benefits of segmentation?

A)Improve Operational Performance
B)Limit Cyberattack Damage
C)Protect Vulnerable Devices
D)Reduce the scope of compliance
E)All of these answers

17. Which is incorrect from the following statement in context to resource availability?

A)By resource availability, we can remove the single point of failure.
B)DoS attacks on the control system doesn’t impact its availability.
C)Redundancy ensures that the system can operate in case of DoS attacks.
D)Ensuring backup systems is also part of resource availability

18. Which devices or technologies are used for segmentation?

A)Virtual Local Area Networks
B)All of these answers
C)Firewalls
D)Unidirectional Gateways

19. What is correct in context to SIEM?

A)Security information and management
B)Security intimation and event management
C)Security information and event management
D)Security event management

20. What is the correct sequence for identification and authentication?

A)Authorization> Authentication> Identification
B)Authorization >Identification> Authentication
C)Identification>Authorization>Authentication
D)Identification> Authentication>Authorization

21. Which one is correct in terms of the functionalities of SIEM?

A)Correlation
B)Retention
C)All of these answers
D)Incident Response
E)Alerting

22. What are the reasons that cause security problems in control system architectures?

A)Increasing dependency on automation and control systems.
B)All of these answers
C)Insecure connectivity to external networks
D)Usage of technologies with known vulnerabilities.

23. Which one is incorrect?

A)In IT Systems reboot is not acceptable
B)In OT fault tolerance is essential.
C)IT systems have confidentiality and integrity as a priority
D)OT Systems are time critical

24. A hacker guessing the suggested password to a program is called as?

A)Password guessing
B)Dictionary Attack
C)Default password attack
D)None of these answers

25. Which one of the following is not a DCS:

A)SPPA-T3000
B)Siemens S7
C)Delta V
D)Honeywell Experion

Click Here for Answers

If you liked this article, then please subscribe to our YouTube Channel for Electrical, Electronics, Instrumentation, PLC, and SCADA video tutorials.

You can also follow us on Facebook and Twitter to receive daily updates.

Next Quiz:

You've successfully subscribed !
Share

Recent Articles

  • PLC Tutorials

PLC Ladder Logic Design: Control 3 Motors with Toggle Switch

PLC ladder logic design to control 3 motors with toggle switch and explain the program…

3 weeks ago
  • PLC Tutorials

VFD Simulator Download – Free Yaskawa V1000 Software

VFD simulator download: Master the online tool from the Yaskawa V1000 & programming software for…

4 days ago
  • PLC Tutorials

Conveyor Sorting Machine PLC Program with Calculation Function

The conveyor sorting machine is widely used in the packing industries using the PLC program…

7 days ago
  • PLC Tutorials

Example of Flip-Flop PLC Program for Lamps Application

Learn the example of flip-flop PLC program for lamps application using the ladder logic to…

7 days ago
  • PLC Tutorials

STAR DELTA Programming using PLC Controller

In this article, you will learn the STAR DELTA programming using PLC controller to start…

1 week ago
  • Instrumentation Design

Single and Three Phase Immersion Electrical Heaters Wiring Circuits

Lube oil consoles of rotary equipment packages in industrial process plants are usually equipped with…

5 days ago