ANSWERS.
Supervisory control and data acquisition (SCADA) devices are most often associated with:
correct answers utilities
What is a worm? correct answers Malware
True or False? Botnets can (often) perform distributed denial of service (DDoS) attacks in which
thousands of individual computers send overwhelming amounts of traffic at a victim's computer.
Correct! correct answers True
Desktop malware may not represent a direct threat to ________- or PLC-based equipment, but
practical attacks exist on these systems. correct answers SCADA
True or False? In requirement-based security, we identify and prioritize our security needs in a
risk assessment process.
Correct! correct answers True
Car ignition locks are an example of what type of decision? correct answers Rule-based
Both forms of the RMF illustrate a(n) _______ engineering process as a way to plan, design, and
build a complicated system. correct answers systems
True or False? The security process and the Information engineering process find their origin in
the concept of Continuous Improvement. correct answers False
True or False? A supervisory control and data acquisition (SCADA) device is a computer that
controls motors, valves, and other devices in industrial applications. correct answers True
, A security decision, such as locking your vehicle when not in use, is an example of: correct
answers rule-based security.
Which of the following is an example of a rule-based security decision? correct answers Locking
a car's ignition
Which of the following is an example of security theater? correct answers Installing a fake video
camera
True or False? The term "security theater" refers to security measures intended to make potential
victims feel safe and secure without regard to their effectiveness.
Correct! correct answers True
Risk Management Framework is a way to assess _______________ risks when developing large-
scale computer systems. correct answers cybersecurity
True or False? Security Category RMF begins with a high-level estimate of the impact caused by
cyber security failures. correct answers True
True or False? A vulnerability is a weakness in the boundary that protects the assets from the
threat agents. correct answers True
True or False? A threat agent is a person who did attack our assets, while an attacker might attack
an asset. correct answers False
Which of the following is a person who has learned specific attacks on computer systems and
can use those specific attacks? correct answers Cracker
CIA properties do not include: correct answers authentication.