Page | 1
Itn 262 midterm Questions with
Detailed Verified Answers
Question: Supervisory control and data acquisition (SCADA) devices are most
often associated with:
Ans: Utilities
Question: What is a worm?
Ans: Malware
Question: True or False? Botnets can (often) perform distributed denial of
service (DDoS) attacks in which thousands of individual computers send
overwhelming amounts of traffic at a victim's computer.
True
False
Ans: true
Question: Desktop malware may not represent a direct threat to ________- or
PLC-based equipment, but practical attacks exist on these systems.
b) FRA
a) DOS
c) PLC
d) SCADA
, Page | 2
Ans: scada
Question: True or False? In requirement-based security, we identify and
prioritize our security needs in a risk assessment process.
True
False
Ans: true
Question: Car ignition locks are an example of what type of decision?
c) Rule-based
a) Requirement-based
d) Hunter's dilemma
b) Relativistic-based
Ans: Rule-based
Question: Both forms of the RMF illustrate a(n) _______ engineering process
as a way to plan, design, and build a complicated system.
a) computer
c) systems
b) security
d) information
Ans: systems
, Page | 3
Question: True or False? The security process and the Information
engineering process find their origin in the concept of Continuous
Improvement.
True
False
Ans: False
Question: True or False? A supervisory control and data acquisition (SCADA)
device is a computer that controls motors, valves, and other devices in
industrial applications.
True
False
Ans: true
Question: A security decision, such as locking your vehicle when not in use, is
an example of:
d) None of these is correct.
a) rule-based security.
c) integrity.
b) the hunter's dilemma.
Ans: rule-based security
Question: Which of the following is an example of a rule-based security
decision?
c) Applying "security theater"
, Page | 4
d) Trying to outdo a neighbor's security measures
a) Locking a car's ignition
b) Performing a step-by-step security analysis
Ans: locking a cars ignition
Question: Which of the following is an example of security theater?
a) Locking a car's ignition
b) Installing a fake video camera
c) Trying to outrun a hungry bear
d) Choosing a defense based on a systematic, step-by-step process
Ans: Installing a fake video camera
Question: True or False? The term "security theater" refers to security
measures intended to make potential victims feel safe and secure without
regard to their effectiveness.
True
False
Ans: true
Question: Risk Management Framework is a way to assess _______________
risks when developing large-scale computer systems.
Ans: cybersecurity
Itn 262 midterm Questions with
Detailed Verified Answers
Question: Supervisory control and data acquisition (SCADA) devices are most
often associated with:
Ans: Utilities
Question: What is a worm?
Ans: Malware
Question: True or False? Botnets can (often) perform distributed denial of
service (DDoS) attacks in which thousands of individual computers send
overwhelming amounts of traffic at a victim's computer.
True
False
Ans: true
Question: Desktop malware may not represent a direct threat to ________- or
PLC-based equipment, but practical attacks exist on these systems.
b) FRA
a) DOS
c) PLC
d) SCADA
, Page | 2
Ans: scada
Question: True or False? In requirement-based security, we identify and
prioritize our security needs in a risk assessment process.
True
False
Ans: true
Question: Car ignition locks are an example of what type of decision?
c) Rule-based
a) Requirement-based
d) Hunter's dilemma
b) Relativistic-based
Ans: Rule-based
Question: Both forms of the RMF illustrate a(n) _______ engineering process
as a way to plan, design, and build a complicated system.
a) computer
c) systems
b) security
d) information
Ans: systems
, Page | 3
Question: True or False? The security process and the Information
engineering process find their origin in the concept of Continuous
Improvement.
True
False
Ans: False
Question: True or False? A supervisory control and data acquisition (SCADA)
device is a computer that controls motors, valves, and other devices in
industrial applications.
True
False
Ans: true
Question: A security decision, such as locking your vehicle when not in use, is
an example of:
d) None of these is correct.
a) rule-based security.
c) integrity.
b) the hunter's dilemma.
Ans: rule-based security
Question: Which of the following is an example of a rule-based security
decision?
c) Applying "security theater"
, Page | 4
d) Trying to outdo a neighbor's security measures
a) Locking a car's ignition
b) Performing a step-by-step security analysis
Ans: locking a cars ignition
Question: Which of the following is an example of security theater?
a) Locking a car's ignition
b) Installing a fake video camera
c) Trying to outrun a hungry bear
d) Choosing a defense based on a systematic, step-by-step process
Ans: Installing a fake video camera
Question: True or False? The term "security theater" refers to security
measures intended to make potential victims feel safe and secure without
regard to their effectiveness.
True
False
Ans: true
Question: Risk Management Framework is a way to assess _______________
risks when developing large-scale computer systems.
Ans: cybersecurity