1. Which protocol is commonly used in industrial control systems for real-time data communication?
Show Answer
✅ Correct Answer: Modbus
2. Which attack involves unauthorized access to SCADA systems?
Remote Exploitation
DDoS
SQL Injection
XSS
Show Answer
✅ Correct Answer: Remote Exploitation
3. Which encryption method is recommended for ICS/SCADA communication?
Show Answer
✅ Correct Answer: AES-256
4. Which industry is most reliant on ICS/SCADA security?
Energy
Retail
Banking
E-commerce
Show Answer
✅ Correct Answer: Energy
5. Which organization sets standards for ICS security?
Show Answer
✅ Correct Answer: NIST
6. Which component of ICS is responsible for controlling physical processes?
PLC
Firewall
IDS
Load Balancer
Show Answer
✅ Correct Answer: PLC
7. Which security principle is crucial for protecting ICS networks?
Defense in Depth
Single Layer Security
Open Access
Default Trust
Show Answer
✅ Correct Answer: Defense in Depth
8. Which tool is commonly used for monitoring ICS networks?
Wireshark
Metasploit
Burp Suite
Aircrack-ng
Show Answer
✅ Correct Answer: Wireshark
9. Which risk is associated with outdated ICS systems?
Increased Vulnerability to Exploits
Higher Cost of Electricity
Lower Production Output
Reduced Firewall Efficiency
Show Answer
✅ Correct Answer: Increased Vulnerability to Exploits
10. Which cybersecurity measure prevents unauthorized network access to ICS systems?
Air-Gapping
Wi-Fi Encryption
Port Forwarding
VPN
Show Answer
✅ Correct Answer: Air-Gapping
11. Which cyber attack can disrupt industrial processes by modifying sensor readings?
Data Injection
Ransomware
Brute Force
Phishing
Show Answer
✅ Correct Answer: Data Injection
12. Which standard provides best practices for securing ICS/SCADA systems?
NIST 800-82
PCI DSS
ISO 27002
COBIT 5
Show Answer
✅ Correct Answer: NIST 800-82
13. Which security measure is used to detect abnormal activities in ICS networks?
Intrusion Detection System (IDS)
Firewall
Load Balancer
Proxy Server
Show Answer
✅ Correct Answer: Intrusion Detection System (IDS)
14. Which malware was specifically designed to target ICS/SCADA systems?
Stuxnet
WannaCry
CryptoLocker
Zeus
Show Answer
✅ Correct Answer: Stuxnet
15. Which communication standard is widely used in SCADA systems?
Show Answer
✅ Correct Answer: DNP3
16. Which security measure can help prevent ICS attacks from spreading between networks?
Network Segmentation
Port Forwarding
Unrestricted Remote Access
Disabling Logging
Show Answer
✅ Correct Answer: Network Segmentation
17. Which SCADA system component provides a human interface for monitoring industrial processes?
HMI
Router
Firewall
DNS Server
Show Answer
✅ Correct Answer: HMI
18. Which security strategy is used to protect ICS against zero-day vulnerabilities?
Application Whitelisting
Antivirus Scanning
Open Network Access
Default Trust Model
Show Answer
✅ Correct Answer: Application Whitelisting
19. Which factor makes ICS/SCADA systems more vulnerable to cyber threats?
Long Equipment Lifecycles
High Bandwidth Requirements
Low Power Consumption
Frequent System Updates
Show Answer
✅ Correct Answer: Long Equipment Lifecycles
20. Which technology helps secure ICS communications by verifying data integrity?
Digital Signatures
Dynamic Routing
NAT
DHCP
Show Answer
✅ Correct Answer: Digital Signatures
21. Which protocol is commonly targeted in ICS/SCADA man-in-the-middle attacks?
Show Answer
✅ Correct Answer: Modbus TCP
22. What is the primary security risk of using default credentials in ICS devices?
Unauthorized access
Data corruption
Network congestion
Firmware corruption
Show Answer
✅ Correct Answer: Unauthorized access
23. Which component acts as the brain of an ICS system?
Show Answer
✅ Correct Answer: PLC
24. What is the purpose of a demilitarized zone (DMZ) in ICS networks?
To isolate control systems from corporate networks
To increase network speed
To reduce firewall rules
To enable remote desktop access
Show Answer
✅ Correct Answer: To isolate control systems from corporate networks
25. Which attack vector specifically targets safety instrumented systems?
Triton malware
WannaCry
NotPetya
Mirai
Show Answer
✅ Correct Answer: Triton malware
26. What is the primary purpose of IEC 62443 standard?
To secure industrial automation systems
To regulate power grid frequencies
To standardize PLC programming
To certify SCADA operators
Show Answer
✅ Correct Answer: To secure industrial automation systems
27. Which security control is most effective against replay attacks in ICS?
Message authentication codes
Port security
MAC filtering
VLAN segmentation
Show Answer
✅ Correct Answer: Message authentication codes
28. What is the biggest challenge in patching ICS systems?
System availability requirements
Patch file sizes
Authentication protocols
Network bandwidth
Show Answer
✅ Correct Answer: System availability requirements
29. Which communication method is most vulnerable to RF interference?
Wireless HART
Fiber optic
Ethernet
RS-485
Show Answer
✅ Correct Answer: Wireless HART
30. What does RTU stand for in SCADA systems?
Remote Terminal Unit
Real-Time Update
Routing Table Utility
Redundant Transfer Unit
Show Answer
✅ Correct Answer: Remote Terminal Unit
31. Which ICS protocol is most susceptible to enumeration attacks?
DNP3
OPC UA
Profinet
EtherNet/IP
Show Answer
✅ Correct Answer: DNP3
32. What is the primary security risk of fieldbus protocols?
Lack of encryption
Slow transmission speeds
High power consumption
Complex addressing
Show Answer
✅ Correct Answer: Lack of encryption
33. Which ICS component is most vulnerable to physical tampering?
Field devices
Control servers
Network switches
Engineering workstations
Show Answer
✅ Correct Answer: Field devices
34. What is the purpose of a safety instrumented system (SIS)?
To prevent catastrophic failures
To optimize production
To monitor network traffic
To authenticate operators
Show Answer
✅ Correct Answer: To prevent catastrophic failures
35. Which security measure is most effective for legacy ICS systems?
Network segmentation
Patch management
Multi-factor authentication
Full disk encryption
Show Answer
✅ Correct Answer: Network segmentation
36. What is the primary risk of using USB devices in ICS environments?
Malware infection
Data corruption
Network slowdown
Power surges
Show Answer
✅ Correct Answer: Malware infection
37. Which protocol provides native security features for ICS communications?
OPC UA
Modbus
DNP3
Profibus
Show Answer
✅ Correct Answer: OPC UA
38. What is the primary purpose of a jump server in ICS security?
To control access to critical systems
To increase network speed
To bypass firewalls
To monitor power consumption
Show Answer
✅ Correct Answer: To control access to critical systems
39. Which ICS attack involves manipulating process setpoints?
Parameter tampering
Denial of service
Credential stuffing
SQL injection
Show Answer
✅ Correct Answer: Parameter tampering
40. What is the biggest security concern with IIoT devices in ICS?
Default credentials
High power consumption
Large data volumes
Complex protocols
Show Answer
✅ Correct Answer: Default credentials
41. Which security control is most effective against ICS ransomware?
Application whitelisting
Network encryption
Intrusion prevention
Log monitoring
Show Answer
✅ Correct Answer: Application whitelisting
42. What is the primary purpose of Purdue Model in ICS security?
To define network segmentation levels
To standardize PLC programming
To optimize power usage
To certify operators
Show Answer
✅ Correct Answer: To define network segmentation levels
43. Which ICS protocol is most vulnerable to spoofing attacks?
Modbus
OPC UA
IEC 61850
EtherCAT
Show Answer
✅ Correct Answer: Modbus
44. What is the primary security risk of wireless ICS communications?
Eavesdropping
Slow speeds
High latency
Power consumption
Show Answer
✅ Correct Answer: Eavesdropping
45. Which component is most critical for ICS availability?
Redundant controllers
Firewalls
Log servers
VPN concentrators
Show Answer
✅ Correct Answer: Redundant controllers
46. What is the purpose of a historian in SCADA systems?
To store process data
To authenticate users
To encrypt communications
To detect intrusions
Show Answer
✅ Correct Answer: To store process data
47. Which security measure is most effective for field devices?
Physical security
Disk encryption
Antivirus software
Password policies
Show Answer
✅ Correct Answer: Physical security
48. What is the primary risk of using cellular communications in ICS?
Signal interception
High costs
Limited bandwidth
Power requirements
Show Answer
✅ Correct Answer: Signal interception
49. Which ICS security standard focuses on nuclear facilities?
NRC RG 5.71
NIST SP 800-82
IEC 62443
ISO 27001
Show Answer
✅ Correct Answer: NRC RG 5.71
50. What is the purpose of a safety lifecycle in ICS security?
To manage risk throughout system operation
To optimize production schedules
To train operators
To monitor network traffic
Show Answer
✅ Correct Answer: To manage risk throughout system operation
51. Which attack vector specifically targets human-machine interfaces?
HMI spoofing
PLC firmware attacks
RTU exploits
SCADA server breaches
Show Answer
✅ Correct Answer: HMI spoofing
52. What is the primary security benefit of using fiber optic cables in ICS?
Tapping resistance
Lower cost
Easier installation
Higher bandwidth
Show Answer
✅ Correct Answer: Tapping resistance
53. Which ICS protocol is most commonly used in electrical substations?
IEC 61850
Modbus
DNP3
Profibus
Show Answer
✅ Correct Answer: IEC 61850
54. What is the primary purpose of a security information and event management (SIEM) system in ICS?
To correlate security events
To control processes
To authenticate field devices
To program PLCs
Show Answer
✅ Correct Answer: To correlate security events
55. Which security control is most effective against social engineering in ICS?
Security awareness training
Network segmentation
Firewall rules
Encryption
Show Answer
✅ Correct Answer: Security awareness training
56. What is the primary risk of using commercial off-the-shelf (COTS) software in ICS?
Vulnerability to commodity malware
High licensing costs
Complex configuration
Limited features
Show Answer
✅ Correct Answer: Vulnerability to commodity malware
57. Which ICS security framework was developed by the North American Electric Reliability Corporation?
NERC CIP
NIST SP 800-82
IEC 62443
ISO 27019
Show Answer
✅ Correct Answer: NERC CIP
58. What is the purpose of a bastion host in ICS security?
To control access to critical systems
To optimize network performance
To monitor power usage
To store backup data
Show Answer
✅ Correct Answer: To control access to critical systems
59. Which attack technique involves manipulating ICS time synchronization?
Time stomping
Buffer overflow
SQL injection
Cross-site scripting
Show Answer
✅ Correct Answer: Time stomping
60. What is the primary security benefit of using unidirectional gateways in ICS?
Physical data flow control
Faster data transfer
Lower implementation cost
Simpler configuration
Show Answer
✅ Correct Answer: Physical data flow control
61. Which ICS component is most vulnerable to firmware attacks?
PLC
HMI
Historian
Engineering workstation
Show Answer
✅ Correct Answer: PLC
62. What is the purpose of a security patch management policy in ICS?
To manage vulnerability remediation
To optimize system performance
To reduce licensing costs
To standardize configurations
Show Answer
✅ Correct Answer: To manage vulnerability remediation
63. Which ICS protocol is most commonly used in oil and gas pipelines?
DNP3
Modbus
Profibus
EtherNet/IP
Show Answer
✅ Correct Answer: DNP3
64. What is the primary security risk of third-party vendor access to ICS?
Compromised credentials
Network congestion
Software incompatibility
Power fluctuations
Show Answer
✅ Correct Answer: Compromised credentials
65. Which security control is most effective against ICS denial-of-service attacks?
Rate limiting
Data encryption
Password complexity
Log analysis
Show Answer
✅ Correct Answer: Rate limiting
66. What is the purpose of a security operations center (SOC) in ICS?
To monitor and respond to security incidents
To control industrial processes
To program field devices
To optimize production schedules
Show Answer
✅ Correct Answer: To monitor and respond to security incidents
67. Which ICS security standard focuses on process automation?
ISA/IEC 62443
NERC CIP
NIST SP 800-82
ISO 27001
Show Answer
✅ Correct Answer: ISA/IEC 62443
68. What is the primary security benefit of role-based access control in ICS?
Least privilege enforcement
Faster authentication
Simpler user management
Reduced logging requirements
Show Answer
✅ Correct Answer: Least privilege enforcement
69. Which attack technique involves manipulating ICS alarm systems?
Alarm suppression
Data diddling
Phishing
Watering hole attacks
Show Answer
✅ Correct Answer: Alarm suppression
70. What is the purpose of a security configuration baseline in ICS?
To define secure system settings
To optimize process control
To reduce energy consumption
To standardize operator training
Show Answer
✅ Correct Answer: To define secure system settings
71. Which ICS component is most vulnerable to USB-based attacks?
Engineering workstation
PLC
RTU
HMI
Show Answer
✅ Correct Answer: Engineering workstation
72. What is the primary security risk of cloud connectivity in ICS?
Expanded attack surface
Higher latency
Increased costs
Complex configuration
Show Answer
✅ Correct Answer: Expanded attack surface
73. Which security control is most effective against ICS insider threats?
User behavior analytics
Network segmentation
Firewall rules
Data encryption
Show Answer
✅ Correct Answer: User behavior analytics
74. What is the purpose of a security risk assessment in ICS?
To identify and prioritize vulnerabilities
To optimize production output
To reduce energy consumption
To standardize operator interfaces
Show Answer
✅ Correct Answer: To identify and prioritize vulnerabilities
75. Which ICS protocol is most commonly used in manufacturing automation?
Profinet
DNP3
Modbus
IEC 61850
Show Answer
✅ Correct Answer: Profinet
76. What is the primary security benefit of using virtual LANs (VLANs) in ICS?
Logical segmentation
Faster data transfer
Simpler cabling
Reduced power usage
Show Answer
✅ Correct Answer: Logical segmentation
77. Which attack technique involves manipulating ICS backup systems?
Backup corruption
DNS spoofing
SQL injection
Cross-site scripting
Show Answer
✅ Correct Answer: Backup corruption
78. What is the purpose of a security incident response plan in ICS?
To define procedures for handling breaches
To optimize process control
To reduce maintenance costs
To standardize operator training
Show Answer
✅ Correct Answer: To define procedures for handling breaches
79. Which ICS security standard focuses on water treatment systems?
AWWA Standard 512
NERC CIP
IEC 62443
NIST SP 800-82
Show Answer
✅ Correct Answer: AWWA Standard 512
80. What is the primary security risk of using mobile devices in ICS?
Device loss/theft
High power consumption
Limited processing power
Small screen size
Show Answer
✅ Correct Answer: Device loss/theft
81. Which security control is most effective against ICS supply chain attacks?
Vendor security assessments
Network encryption
Password policies
Log monitoring
Show Answer
✅ Correct Answer: Vendor security assessments
82. What is the purpose of a security awareness program in ICS?
To educate personnel about risks
To optimize process control
To reduce energy consumption
To standardize configurations
Show Answer
✅ Correct Answer: To educate personnel about risks
83. Which ICS protocol is most commonly used in building automation?
BACnet
Modbus
DNP3
Profinet
Show Answer
✅ Correct Answer: BACnet
84. What is the primary security benefit of using out-of-band management in ICS?
Isolated administrative access
Faster data transfer
Simpler configuration
Reduced hardware costs
Show Answer
✅ Correct Answer: Isolated administrative access
85. Which attack technique involves manipulating ICS firmware updates?
Malicious code injection
Phishing
DNS spoofing
Watering hole attacks
Show Answer
✅ Correct Answer: Malicious code injection
86. What is the purpose of a security audit in ICS?
To verify compliance with policies
To optimize production
To reduce maintenance costs
To standardize operator interfaces
Show Answer
✅ Correct Answer: To verify compliance with policies
87. Which ICS security standard focuses on transportation systems?
TSA Security Guidelines
NERC CIP
IEC 62443
NIST SP 800-82
Show Answer
✅ Correct Answer: TSA Security Guidelines
88. What is the primary security risk of using open-source software in ICS?
Undiscovered vulnerabilities
High licensing costs
Complex configuration
Limited features
Show Answer
✅ Correct Answer: Undiscovered vulnerabilities
89. Which security control is most effective against ICS zero-day exploits?
Application whitelisting
Network segmentation
Firewall rules
Data encryption
Show Answer
✅ Correct Answer: Application whitelisting
90. What is the purpose of a security vulnerability scanning policy in ICS?
To identify system weaknesses
To optimize process control
To reduce energy consumption
To standardize operator training
Show Answer
✅ Correct Answer: To identify system weaknesses
91. Which ICS protocol is most commonly used in railway signaling systems?
IEC 62280
Modbus
DNP3
Profinet
Show Answer
✅ Correct Answer: IEC 62280
92. What is the primary security benefit of using hardware security modules (HSMs) in ICS?
Secure key management
Faster processing
Simpler configuration
Reduced power usage
Show Answer
✅ Correct Answer: Secure key management
93. Which attack technique involves manipulating ICS network traffic?
Packet injection
Phishing
Credential stuffing
Watering hole attacks
Show Answer
✅ Correct Answer: Packet injection
94. What is the purpose of a security change management process in ICS?
To control system modifications
To optimize production
To reduce maintenance costs
To standardize operator interfaces
Show Answer
✅ Correct Answer: To control system modifications
95. Which ICS security standard focuses on chemical facilities?
CFATS
NERC CIP
IEC 62443
NIST SP 800-82
Show Answer
✅ Correct Answer: CFATS
96. What is the primary security risk of using remote desktop protocols in ICS?
Credential theft
High bandwidth usage
Software incompatibility
Power fluctuations
Show Answer
✅ Correct Answer: Credential theft
97. Which security control is most effective against ICS phishing attacks?
User training
Network segmentation
Firewall rules
Data encryption
Show Answer
✅ Correct Answer: User training
98. What is the purpose of a security asset inventory in ICS?
To track critical components
To optimize process control
To reduce energy consumption
To standardize operator training
Show Answer
✅ Correct Answer: To track critical components
99. Which ICS protocol is most commonly used in maritime systems?
IEC 61162
Modbus
DNP3
Profinet
Show Answer
✅ Correct Answer: IEC 61162
100. What is the primary security benefit of using industrial firewalls in ICS?
Protocol-aware filtering
Faster data transfer
Simpler configuration
Reduced hardware costs
Show Answer
✅ Correct Answer: Protocol-aware filtering
101. Which attack technique involves manipulating ICS historian data?
Data falsification
Phishing
DNS spoofing
Watering hole attacks
Show Answer
✅ Correct Answer: Data falsification
102. What is the purpose of a security governance framework in ICS?
To define security responsibilities
To optimize production
To reduce maintenance costs
To standardize operator interfaces
Show Answer
✅ Correct Answer: To define security responsibilities
103. Which ICS security standard focuses on oil and gas pipelines?
API 1164
NERC CIP
IEC 62443
NIST SP 800-82
Show Answer
✅ Correct Answer: API 1164
104. What is the primary security risk of using wireless sensors in ICS?
Signal jamming
High power consumption
Limited range
Complex configuration
Show Answer
✅ Correct Answer: Signal jamming
105. Which security control is most effective against ICS ransomware?
Air-gapped backups
Network encryption
Password policies
Log monitoring
Show Answer
✅ Correct Answer: Air-gapped backups
106. What is the purpose of a security risk register in ICS?
To document and track risks
To optimize process control
To reduce energy consumption
To standardize operator training
Show Answer
✅ Correct Answer: To document and track risks
107. Which ICS protocol is most commonly used in mining operations?
EtherNet/IP
Modbus
DNP3
Profinet
Show Answer
✅ Correct Answer: EtherNet/IP
108. What is the primary security benefit of using application allowlisting in ICS?
Prevents unauthorized executables
Faster processing
Simpler configuration
Reduced storage requirements
Show Answer
✅ Correct Answer: Prevents unauthorized executables
109. Which attack technique involves manipulating ICS operator displays?
Visual spoofing
Phishing
Credential stuffing
Watering hole attacks
Show Answer
✅ Correct Answer: Visual spoofing
110. What is the purpose of a security maturity assessment in ICS?
To measure security program effectiveness
To optimize production
To reduce maintenance costs
To standardize operator interfaces
Show Answer
✅ Correct Answer: To measure security program effectiveness