Which entities can cancel generator reactive capability tests prior to or during the
testing process?
Give this one a try later!
PJM
The affected TO
What information does PJM provide to members during a Minimum Generation Alert
Give this one a try later!
, Adjusted Minimum Generation
Valley and load estimate
The following would be considered non-critical plant load
Give this one a try later!
Lighting
Office Area Air Conditioners
What is the significance of the outages occurring after the peak demand?
Give this one a try later!
Solar generation declines after the peak
By what hour must resolutions for the TODAY Report in Gen Checkout be handled
Give this one a try later!
04:00
Which emergency procedure will PJM issue when the available Primary Reserve
capacity is less than the largest operating generator, or the loss of a transmission
,facility jeopardizes reliable operations after all possible measures are taken to
increase reserves?
Give this one a try later!
Manual Load Dump Warning
Select all the potential events when Conservative Operations could be
Give this one a try later!
A. Hydraulic Fracturing for natural gas
B. Reports of sabotage on the bulk electric system
C. Geo-magnetic disturbance events
D. Distributed denial-of-service attacks on critical infrastructure networks
E. Ice Storms
Which of the following statements would be considered as an implication from
receiving power from an outside entity?
Give this one a try later!
Unintentional interconnection between the two areas
Underthe National Terrorism Advisory System (NTAS) there are 2 types of alerts:
Elevated Threat Alert and ______
Give this one a try later!
, Imminent Threat Alert
Who regulates PJM?
Give this one a try later!
The Federal Energy Regulatory Commission (FERC)
How often are the routine satellite phone tests performed?
Give this one a try later!
Weekly
Which of the following statements about cyber clean code/devices and the
processes of cleaning are true?
Give this one a try later!
If a cyber issue is found and a way to address the issue is not known, it's
important to isolate the code/device so it doesn't get worse, or spread the
issue elsewhere.
When a cyber issue is found it is of paramount importance to not only
ensure the code/device is clean but the method of infection discovered
and addressed.
testing process?
Give this one a try later!
PJM
The affected TO
What information does PJM provide to members during a Minimum Generation Alert
Give this one a try later!
, Adjusted Minimum Generation
Valley and load estimate
The following would be considered non-critical plant load
Give this one a try later!
Lighting
Office Area Air Conditioners
What is the significance of the outages occurring after the peak demand?
Give this one a try later!
Solar generation declines after the peak
By what hour must resolutions for the TODAY Report in Gen Checkout be handled
Give this one a try later!
04:00
Which emergency procedure will PJM issue when the available Primary Reserve
capacity is less than the largest operating generator, or the loss of a transmission
,facility jeopardizes reliable operations after all possible measures are taken to
increase reserves?
Give this one a try later!
Manual Load Dump Warning
Select all the potential events when Conservative Operations could be
Give this one a try later!
A. Hydraulic Fracturing for natural gas
B. Reports of sabotage on the bulk electric system
C. Geo-magnetic disturbance events
D. Distributed denial-of-service attacks on critical infrastructure networks
E. Ice Storms
Which of the following statements would be considered as an implication from
receiving power from an outside entity?
Give this one a try later!
Unintentional interconnection between the two areas
Underthe National Terrorism Advisory System (NTAS) there are 2 types of alerts:
Elevated Threat Alert and ______
Give this one a try later!
, Imminent Threat Alert
Who regulates PJM?
Give this one a try later!
The Federal Energy Regulatory Commission (FERC)
How often are the routine satellite phone tests performed?
Give this one a try later!
Weekly
Which of the following statements about cyber clean code/devices and the
processes of cleaning are true?
Give this one a try later!
If a cyber issue is found and a way to address the issue is not known, it's
important to isolate the code/device so it doesn't get worse, or spread the
issue elsewhere.
When a cyber issue is found it is of paramount importance to not only
ensure the code/device is clean but the method of infection discovered
and addressed.