ICS/SCADA Cyber Security Exam Questions and Answers
Question 21
Which component of the IT Security Model is the highest priority in ICS/SCADA Security?
Options:
A.
Integrity
B.
Authentication
C.
Availability
D.
Confidentiality
Answer:
C
Explanation:
In ICS/SCADA systems, the highest priority typically is Availability, due to the critical nature of the services and infrastructures they support. These systems often control vital processes in industries like energy, water treatment, and manufacturing. Any downtimecan lead to significant disruptions, safety hazards, or economic losses. Thus, ensuring that systems are operational and accessible is a primary security focus in the context of ICS/SCADA security.References:
National Institute of Standards and Technology (NIST), "Guide to Industrial Control Systems (ICS) Security".
Question 22
Which of the following names represents inbound filtering?
Options:
A.
Funnel
B.
Sanity
C.
Egress
D.
Ingress
Answer:
D
Explanation:
Ingress filtering is a method used in network security to ensure that incoming packets are allowed or blocked based on a set of security rules.
This type of filtering is often implemented at the boundaries of networks to prevent unwanted or harmful traffic from entering a more secure internal network.
The term "ingress" refers to traffic that is entering a network boundary, whereas "egress" refers to traffic exiting a network.
References
Cisco Networking Academy Program: Network Security.
"Understanding Ingress and Egress Filtering," Network Security Guidelines, TechNet.