Deck 12: Industrial and Enterprise Networking

Full screen (f)
exit full mode
Question
An active card,which contains an internal battery,can provide a usable range of up to what distance?

A)100 m
B)150 m
C)200 m
D)250 m
Use Space or
up arrow
down arrow
to flip the card.
Question
In computer forensics,hidden data such as deleted files and file fragments are known as what term?

A)ambient data
B)transient data
C)tombstone data
D)low level data
Question
The first step of a response policy should be to secure the area.
Question
What two methods might be used by an ICS to control a physical system?

A)cyclical control system
B)actuating loop system
C)open loop system
D)closed loop system
Question
________________ is a process of investigating deeper data on a computerand will essentially autopsy the computer to discover hidden data,such asdeleted files and file fragments,and who has accessed that data and when.
Question
eDiscovery and computer forensics reveal what two different types of data?

A)transient data
B)active data
C)ambient data
D)encrypted data
Question
A ______________ is an enclosure made of a conductive material that is designed to block electromagnetic signals,including Wi-Fi.
Question
Any device in an ICS that is motorized and cancontrol the physical system is called a fieldbus.
Question
What type of software is a correction,improvement,or enhancement to a piece of software?

A)patch
B)upgrade
C)rollback
D)kludge
Question
What team member role coordinates the resources necessary to solve a problem?

A)dispatcher
B)manager
C)technical support specialist
D)public relations specialist
Question
Cipherlocks are not designed for physical security,such as on an outside door.
Question
The first step in asset management is to inventory all the components on the network.
Question
Every security policy should include a response policy,which specifically defines the characteristicsof an event that qualifies as a formal incident and the steps that should be followedas a result.
Question
A rollback is also known by what two terms below?

A)backleveling
B)backstepping
C)downleveling
D)downgrading
Question
Microsoft sometimes releases a majorgroup of patches to Windows or a Microsoft application,which it calls a __________________.
Question
The goal of a disaster recovery plan is to ensure ______________.
Question
What two terms describe the process that can reveal a great deal of information,called ESI (electronically stored information)?

A)active data
B)eDiscovery
C)electronic discovery
D)ambient data
Question
A server that collects and stores raw data,and connects to field devices from which it receives raw data and passes data on to other SCADA systems,is known as what two terms below?

A)loop server
B)master terminal unit
C)acquisitions server
D)I/O server
Question
Which team role is the person on call who first notices or is alerted to a problem?

A)manager
B)dispatcher
C)technical support specialist
D)public relations specialist
Question
A _____________ is a small network that is segmented from the rest of the network,and contains computers,called test beds.
Question
At what type of recovery site would computers,devices,and connectivity necessary to rebuilt a network exist,and all are appropriately configured,updated,and connected to match your network's current state?

A)cold site
B)warm site
C)temp site
D)hot site
Question
What should be the first step of a response policy?

A)Determine if escalation is necessary
B)Secure the area
C)Document the scene
D)Monitor evidence and data collection
Question
Which of the following is NOT a step that should be taken as part of a response policy?

A)Secure the area and disconnect devices from the network
B)Create documentation detailing the scene
C)Attempt to access files to determine if they are compromised
D)Protect the chain of custody of evidence
Question
In order to provide access to a historian by personnel working on the corporate network that are not authorized to work on the ICS network,where should the historian be placed?

A)DMZ
B)corporate network
C)Internet
D)private network
Question
Explain what an RFP is.
Question
What team member role focuses on only one thing: solving the problem as quickly as possible?

A)dispatcher
B)manager
C)technical support specialist
D)public relations specialist
Question
When performing inventory on software packages,which of the following is not something that should be inventoried?

A)version number
B)vendor
C)licensing
D)proprietary source code
Question
What is a historian?

A)A centralized database of collected and analyzed data and control activities.
B)A server that collects and stores raw data.
C)A supervisory computer or server,which can control the physical system.
D)Computers,including hardware and software,that people use to monitor and manage the physical systems.
Question
What team member role,if necessary,learns about the situation and the response and then acts as official spokesperson for the organization to the public or other interested parties?

A)dispatcher
B)manager
C)technical support specialist
D)public relations specialist
Question
What type of physical security solution involves a device that scans an individual's unique physical characteristics?

A)proximity access
B)biorecognition access
C)AIT access
D)keypad access
Question
The time period in which a change can be implemented is known as what option below?

A)change period
B)maintenance window
C)work order time
D)service affecting work interval
Question
What are three different changes that you might be required to perform on existing software?
Question
Describe a service level agreement.
Question
Explain what a memorandum of understanding (MOU)is.
Question
Which type of disaster recovery site is a place where the computers,devices,and connectivity necessary to rebuild a network exist,but they are not appropriately configured,updated,or connected?

A)cold site
B)temp site
C)warm site
D)hot site
Question
If a destructive program is running that might be destroying evidence,what should be done?

A)Perform an immediate full backup
B)Attempt to end the process
C)Pull the power cable
D)Record the destruction using a video capture of the screen
Question
What should be in a disaster recovery plan that relates to computers?
Question
Upon receipt of what type of notification is a company required to activate a defensible policy for the preservation of relevant data?

A)subpoena
B)legal hold
C)discovery request
D)chain of custody notice
Question
What type of device can be used to erase contents of a hard drive using a magnetic field?

A)electromagnetic resonance chamber
B)degausser
C)targeted magneto-wipe
D)polarized magnet
Question
Which type of recovery site is a place where computers,devices,and connectivity necessary to rebuild a network exist,with some pieces appropriately configured,updated,or connected?

A)cold site
B)warm site
C)hot site
D)temp site
Question
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
An electronic access badge.
Question
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A magnetic hard drive eraser.
Question
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A supervisory computer orserver in an ICS or SCADA system that controls thephysical system.Also called the control server or theSCADA server.
Question
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A method of authentication in whicha device scans an individual's unique physical characteristics,such as the color patterns in her iris or the geometry of herhand,to verify the user's identity.
Question
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A term that sometimes refers to wired communication,but generally refers to wireless communication thattransmits data regarding specific measurements and conditions,such as weather data transmitted from a weather balloonto ground antennas.
Question
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
An ICS server that collects and storesraw data.This server connects to field devices from which itreceives the raw data and passes that information on to otherservers in the SCADA system.
Question
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A computer,includinghardware and software,that technicians use to monitor andmanage physical systems in an industrial system.
Question
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A smart card that does not require direct contactwith a proximity reader in order to be detected and read.
Question
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A document that details the workthat must be completed for a particular project,includingspecifics such as tasks,deliverables,standards,paymentschedule,and work timeline.
Question
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
An enclosure made of conductive material thatis designed to block electromagnetic signals,including Wi-Fi.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Industrial and Enterprise Networking
1
An active card,which contains an internal battery,can provide a usable range of up to what distance?

A)100 m
B)150 m
C)200 m
D)250 m
B
2
In computer forensics,hidden data such as deleted files and file fragments are known as what term?

A)ambient data
B)transient data
C)tombstone data
D)low level data
A
3
The first step of a response policy should be to secure the area.
False
4
What two methods might be used by an ICS to control a physical system?

A)cyclical control system
B)actuating loop system
C)open loop system
D)closed loop system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
________________ is a process of investigating deeper data on a computerand will essentially autopsy the computer to discover hidden data,such asdeleted files and file fragments,and who has accessed that data and when.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
eDiscovery and computer forensics reveal what two different types of data?

A)transient data
B)active data
C)ambient data
D)encrypted data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
A ______________ is an enclosure made of a conductive material that is designed to block electromagnetic signals,including Wi-Fi.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Any device in an ICS that is motorized and cancontrol the physical system is called a fieldbus.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What type of software is a correction,improvement,or enhancement to a piece of software?

A)patch
B)upgrade
C)rollback
D)kludge
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
What team member role coordinates the resources necessary to solve a problem?

A)dispatcher
B)manager
C)technical support specialist
D)public relations specialist
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Cipherlocks are not designed for physical security,such as on an outside door.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The first step in asset management is to inventory all the components on the network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Every security policy should include a response policy,which specifically defines the characteristicsof an event that qualifies as a formal incident and the steps that should be followedas a result.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
A rollback is also known by what two terms below?

A)backleveling
B)backstepping
C)downleveling
D)downgrading
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Microsoft sometimes releases a majorgroup of patches to Windows or a Microsoft application,which it calls a __________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The goal of a disaster recovery plan is to ensure ______________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
What two terms describe the process that can reveal a great deal of information,called ESI (electronically stored information)?

A)active data
B)eDiscovery
C)electronic discovery
D)ambient data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
A server that collects and stores raw data,and connects to field devices from which it receives raw data and passes data on to other SCADA systems,is known as what two terms below?

A)loop server
B)master terminal unit
C)acquisitions server
D)I/O server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which team role is the person on call who first notices or is alerted to a problem?

A)manager
B)dispatcher
C)technical support specialist
D)public relations specialist
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A _____________ is a small network that is segmented from the rest of the network,and contains computers,called test beds.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
At what type of recovery site would computers,devices,and connectivity necessary to rebuilt a network exist,and all are appropriately configured,updated,and connected to match your network's current state?

A)cold site
B)warm site
C)temp site
D)hot site
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
What should be the first step of a response policy?

A)Determine if escalation is necessary
B)Secure the area
C)Document the scene
D)Monitor evidence and data collection
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is NOT a step that should be taken as part of a response policy?

A)Secure the area and disconnect devices from the network
B)Create documentation detailing the scene
C)Attempt to access files to determine if they are compromised
D)Protect the chain of custody of evidence
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
In order to provide access to a historian by personnel working on the corporate network that are not authorized to work on the ICS network,where should the historian be placed?

A)DMZ
B)corporate network
C)Internet
D)private network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Explain what an RFP is.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
What team member role focuses on only one thing: solving the problem as quickly as possible?

A)dispatcher
B)manager
C)technical support specialist
D)public relations specialist
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
When performing inventory on software packages,which of the following is not something that should be inventoried?

A)version number
B)vendor
C)licensing
D)proprietary source code
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
What is a historian?

A)A centralized database of collected and analyzed data and control activities.
B)A server that collects and stores raw data.
C)A supervisory computer or server,which can control the physical system.
D)Computers,including hardware and software,that people use to monitor and manage the physical systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
What team member role,if necessary,learns about the situation and the response and then acts as official spokesperson for the organization to the public or other interested parties?

A)dispatcher
B)manager
C)technical support specialist
D)public relations specialist
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
What type of physical security solution involves a device that scans an individual's unique physical characteristics?

A)proximity access
B)biorecognition access
C)AIT access
D)keypad access
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
The time period in which a change can be implemented is known as what option below?

A)change period
B)maintenance window
C)work order time
D)service affecting work interval
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What are three different changes that you might be required to perform on existing software?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Describe a service level agreement.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Explain what a memorandum of understanding (MOU)is.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which type of disaster recovery site is a place where the computers,devices,and connectivity necessary to rebuild a network exist,but they are not appropriately configured,updated,or connected?

A)cold site
B)temp site
C)warm site
D)hot site
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
If a destructive program is running that might be destroying evidence,what should be done?

A)Perform an immediate full backup
B)Attempt to end the process
C)Pull the power cable
D)Record the destruction using a video capture of the screen
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
What should be in a disaster recovery plan that relates to computers?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Upon receipt of what type of notification is a company required to activate a defensible policy for the preservation of relevant data?

A)subpoena
B)legal hold
C)discovery request
D)chain of custody notice
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What type of device can be used to erase contents of a hard drive using a magnetic field?

A)electromagnetic resonance chamber
B)degausser
C)targeted magneto-wipe
D)polarized magnet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Which type of recovery site is a place where computers,devices,and connectivity necessary to rebuild a network exist,with some pieces appropriately configured,updated,or connected?

A)cold site
B)warm site
C)hot site
D)temp site
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
An electronic access badge.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A magnetic hard drive eraser.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A supervisory computer orserver in an ICS or SCADA system that controls thephysical system.Also called the control server or theSCADA server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A method of authentication in whicha device scans an individual's unique physical characteristics,such as the color patterns in her iris or the geometry of herhand,to verify the user's identity.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A term that sometimes refers to wired communication,but generally refers to wireless communication thattransmits data regarding specific measurements and conditions,such as weather data transmitted from a weather balloonto ground antennas.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
An ICS server that collects and storesraw data.This server connects to field devices from which itreceives the raw data and passes that information on to otherservers in the SCADA system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A computer,includinghardware and software,that technicians use to monitor andmanage physical systems in an industrial system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A smart card that does not require direct contactwith a proximity reader in order to be detected and read.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A document that details the workthat must be completed for a particular project,includingspecifics such as tasks,deliverables,standards,paymentschedule,and work timeline.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
An enclosure made of conductive material thatis designed to block electromagnetic signals,including Wi-Fi.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.