2110 Final Examination v7.0
March 14, 2023
To complete the final assessment, you will need to answer the following questionnaire in the form of multiple choice. Keep in mind that for each question, there is only one correct answer. Incorrect answers do not detract from the score. To graduate, you will need to have 70% of the correct answers. We will give you up to two opportunities to take the test.
We use the same assessment mechanism as ISA for the International certificate used in official ISA courses.
Quiz Summary
0 of 29 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 29 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 29
1. Question
Which of the following sentences is correct?
CorrectIncorrect -
Question 2 of 29
2. Question
Which of the following situations clearly describes a second-order effect as a result of a critical infrastructure incident?
CorrectIncorrect -
Question 3 of 29
3. Question
Which of the following situations clearly describes an intentional Attack on Industrial Cyber Security?
CorrectIncorrect -
Question 4 of 29
4. Question
Which of the following options describes the Hierarchical Levels of Industrial Systems?
CorrectIncorrect -
Question 5 of 29
5. Question
According to the statistics shown in this course, what percentage of effective attacks on industrial Cyber Security come from the Internet and through Corporate Networks?
CorrectIncorrect -
Question 6 of 29
6. Question
What was the most attacked Critical Sector in the United States during 2015?
CorrectIncorrect -
Question 7 of 29
7. Question
What was the most attacked Critical Sector in the United States during 2014?
CorrectIncorrect -
Question 8 of 29
8. Question
The ICS-CERT Industrial Cyber Security Agency of the United States is in charge of collecting existing Vulnerabilities in the Control Systems and Following the manufacturers for their immediate remediation. In which year did ICS-CERT experience a substantial increase in the Vulnerabilities reported to it?
CorrectIncorrect -
Question 9 of 29
9. Question
What was the Malware that eliminated 30,000 computers from a major oil company in Arabia in a few hours?
CorrectIncorrect -
Question 10 of 29
10. Question
According to the report presented by RISI during 2014, what were the consequences of greater economic losses in the Industrial Sectors?
CorrectIncorrect -
Question 11 of 29
11. Question
What best describes Plant Control Systems?
CorrectIncorrect -
Question 12 of 29
12. Question
Are SCADA Systems characterized from the rest of the other types of Industrial Systems, by?
CorrectIncorrect -
Question 13 of 29
13. Question
Which of the following options corresponds to consequences in industrial environments?
CorrectIncorrect -
Question 14 of 29
14. Question
How are the priorities in Industrial Systems? Sorted from most important to least important.
CorrectIncorrect -
Question 15 of 29
15. Question
Which of the following options are all Foundational Requirements for an Industrial Cyber Security System?
CorrectIncorrect -
Question 16 of 29
16. Question
Comprehensive Defense is:
CorrectIncorrect -
Question 17 of 29
17. Question
“Designing the Exit to Risk” is an example of:
CorrectIncorrect -
Question 18 of 29
18. Question
Which of the following are all typical or most common vulnerabilities in industrial systems?
CorrectIncorrect -
Question 19 of 29
19. Question
Different types of Threats can be
CorrectIncorrect -
Question 20 of 29
20. Question
Indicate which of the following options corresponds to a Passive Threat
CorrectIncorrect -
Question 21 of 29
21. Question
Which of the following are all Active Threats?
CorrectIncorrect -
Question 22 of 29
22. Question
Which of the following options corresponds to Non-directed Threats?
CorrectIncorrect -
Question 23 of 29
23. Question
Which of the following options contains the pillars of Cyber Security?
CorrectIncorrect -
Question 24 of 29
24. Question
Which of the following are standards for Industrial Cyber Security?
CorrectIncorrect -
Question 25 of 29
25. Question
To which working group of the ISA99 Committee does the ISA/IEC-62443-2-1 standard belong?
CorrectIncorrect -
Question 26 of 29
26. Question
Which of the following formulas is correct?
CorrectIncorrect -
Question 27 of 29
27. Question
The activity or element of the ISA/IEC 62443 standard identified as “Business Rationality” is mandatory.
CorrectIncorrect -
Question 28 of 29
28. Question
Which of the following activities listed below should be done before the others?
CorrectIncorrect -
Question 29 of 29
29. Question
Which of the following options are used to harden Control Systems?
CorrectIncorrect