Exam 12: Industrial and Enterprise Networking
In order to provide access to a historian by personnel working on the corporate network that are not authorized to work on the ICS network,where should the historian be placed?
A
What are three different changes that you might be required to perform on existing software?
You might be called on to implement the following three types of changes to existing software:
• patch—A software patch is a correction, improvement, or enhancement to software. It corrects a bug, closes a vulnerability, or adds minor enhancements to only part of the software, leaving most of the code untouched. Microsoft sometimes releases a major group of patches to Windows or a Microsoft application, which it calls a service pack.
• upgrade—A software upgrade is a major change to a software package that enhances the functionality and features of the software, while also correcting bugs and vulnerabilities. When a patch or upgrade is applied to device drivers, it is called a driver update.
• rollback—A software rollback, also called backleveling or downgrading, is the process of reverting to a previous version of software after attempting to patch or upgrade it.
Which type of recovery site is a place where computers,devices,and connectivity necessary to rebuild a network exist,with some pieces appropriately configured,updated,or connected?
B
Upon receipt of what type of notification is a company required to activate a defensible policy for the preservation of relevant data?
Every security policy should include a response policy,which specifically defines the characteristicsof an event that qualifies as a formal incident and the steps that should be followedas a result.
The first step of a response policy should be to secure the area.
What type of device can be used to erase contents of a hard drive using a magnetic field?
What two terms describe the process that can reveal a great deal of information,called ESI (electronically stored information)?
A ______________ is an enclosure made of a conductive material that is designed to block electromagnetic signals,including Wi-Fi.
Matching
Match each correct item with the statement below.
-A magnetic hard drive eraser.
A _____________ is a small network that is segmented from the rest of the network,and contains computers,called test beds.
Any device in an ICS that is motorized and cancontrol the physical system is called a fieldbus.
________________ is a process of investigating deeper data on a computerand will essentially autopsy the computer to discover hidden data,such asdeleted files and file fragments,and who has accessed that data and when.
Matching
Match each correct item with the statement below.
-An enclosure made of conductive material thatis designed to block electromagnetic signals,including Wi-Fi.
Matching
Match each correct item with the statement below.
-A method of authentication in whicha device scans an individual's unique physical characteristics,such as the color patterns in her iris or the geometry of herhand,to verify the user's identity.
Cipherlocks are not designed for physical security,such as on an outside door.
eDiscovery and computer forensics reveal what two different types of data?
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)