Question 1. When did the SCADA start?
(A) 1980s
(B) 1990s
(C) 1970s
(D) 1960s
Question 2. Out of the following which is not element of threat modelling?
(A) Asset
(B) Vulnerability
(C) Threat
(D) Time
Question 3. The control in SCADA is ________.
(A) Online control
(B) Direct control
(C) Supervisory control
(D) Automatic control
Question 4. Which of the following makes sure that data is not changed when it not supposed to be?
(A) Integrity
(B) Availability
(C) Confidentiality
(D) Accounting
Question 5. Process of identifying any individual?
(A) Auditing
(B) Authorisation
(C) Authentication
(D) Accounting
Question 6. Which of the following is not the component of a SCADA system?
(A) Database server
(B) I/O system
(C) PLC controller
(D) Sparger controller
Question 7. In threat modeling, what methodology used to perform risk analysis?
(A) DREAD
(B) OWASP
(C) STRIDE
(D) DAR
Question 8. What is SCADA?
(A) Software
(B) Process
(C) System
(D) Hardware
Question 9. Which of the following is not the component of IoT Endpoint?
(A) Sensor
(B) Gateway
(C) Communication Module
(D) MCU
Question 10. Even with two-factor authentication, users may still be vulnerable to________attacks.
(A) Scripting
(B) Cross attack
(C) Man-in-the-middle
(D) Radiant
Question 11. Which of the following is the heart of a SCADA system?
(A) PLC
(B) HMI
(C) Alarm task
(D) I/O task
Question 12. Smart Dust can be used to measure the?
(A) Temperature of the industrial lathe machine
(B) Heat inside a computer’s CPU
(C) Chemical in the soil
(D) Strength of a solid material
Question 13. DCS is a _______.
(A) Distributed Control System
(B) Data Control System
(C) Data Column System
(D) Distributed Column System
Question 14. Which of the following is not a correct way to secure communication layer?
(A) Cloud initiated communication
(B) TLS/SSL
(C) IPS (Intrusion Prevention System)
(D) Firewalls
Question 15. Types of Zigbee devices are available as follows:
- i. ZigBee Coordinator
- ii. ZigBee Router
- iii. ZigBee End Device
- iv. ZigBee Accesso
(A) i, ii, iii
(B) i, ii, iii, iv
(C) ii, iii, iv
(D) i, ii, iv
Question 16. RFID stands for _________.
(A) Random frequency identification
(B) Radio frequency identification
(C) Random frequency information
(D) Radio frequency information
Question 17. Which of these statements regarding sensors is TRUE?
(A) Sensors are input devices
(B) Sensors can be analog as well as digital
(C) Sensors respond to some external stimuli
(D) All of these
Question 18. What is the full form of SCADA?
(A) Supervisory Control and Document Acquisition
(B) Supervisory Control and Data Acquisition
(C) Supervisory Column and Data Assessment
(D) Supervisory Column and Data Assessment
Question 19. What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?
(A) Making infrastructure vulnerable to malware
(B) Potential for noncompliance
(C) Data Loss
(D) All of the above
Question 20. The three major components of RFID hardware based on functionality include?
(A) RFID Reader
(B) Reader Antenna
(C) Reader
(D) All of the above
Question 21. Which of the following is not involved in working of IoT?
(A) RFID
(B) Sensor
(C) Nano tech
(D) Server
Question 22. M2M is a term introduced by?
(A) IoT service providers
(B) Fog computing service providers
(C) Telecommunication service providers
(D) None of these
Question 23. Which of the following terms indicates that information is to be read only by those people for whom it is intended?
(A) Availability
(B) Accounting
(C) Integrity
(D) Confidentiality
Question 24. Process that prevents someone from denying that she accessed resource?
(A) Accounting
(B) Non-repudiation
(C) Sniffing
(D) Authorisation
Question 25. ________ tags needs an external source to wake up the battery.
(A) Acitve RFID
(B) Passive RFID
(C) Battery-assisted passive RFID
(D) Battery-assisted active RFID