Page | 1
Itn 262 Midterm study Questions with
Detailed Verified Answers
Question: Supervisory control and data acquisition (SCADA) devices are most
often associated with:
Ans: utilities
Question: What is a worm?
Ans: Malware
Question: True or False? Botnets can (often) perform distributed denial of
service (DDoS) attacks in which thousands of individual computers send
overwhelming amounts of traffic at a victim's computer.
Correct!
Ans: True
Question: Desktop malware may not represent a direct threat to ________- or
PLC-based equipment, but practical attacks exist on these systems.
Ans: SCADA
Question: True or False? In requirement-based security, we identify and
prioritize our security needs in a risk assessment process.
, Page | 2
Correct!
Ans: True
Question: Car ignition locks are an example of what type of decision?
Ans: Rule-based
Question: Both forms of the RMF illustrate a(n) _______ engineering process
as a way to plan, design, and build a complicated system.
Ans: systems
Question: True or False? The security process and the Information
engineering process find their origin in the concept of Continuous
Improvement.
Ans: False
Question: True or False? A supervisory control and data acquisition (SCADA)
device is a computer that controls motors, valves, and other devices in
industrial applications.
Ans: True
Question: A security decision, such as locking your vehicle when not in use, is
an example of:
, Page | 3
Ans: rule-based security.
Question: Which of the following is an example of a rule-based security
decision?
Ans: Locking a car's ignition
Question: Which of the following is an example of security theater?
Ans: Installing a fake video camera
Question: True or False? The term "security theater" refers to security
measures intended to make potential victims feel safe and secure without
regard to their effectiveness.
Correct!
Ans: True
Question: Risk Management Framework is a way to assess _______________
risks when developing large-scale computer systems.
Ans: cybersecurity
Question: True or False? Security Category RMF begins with a high-level
estimate of the impact caused by cyber security failures.
Ans: True
Itn 262 Midterm study Questions with
Detailed Verified Answers
Question: Supervisory control and data acquisition (SCADA) devices are most
often associated with:
Ans: utilities
Question: What is a worm?
Ans: Malware
Question: True or False? Botnets can (often) perform distributed denial of
service (DDoS) attacks in which thousands of individual computers send
overwhelming amounts of traffic at a victim's computer.
Correct!
Ans: True
Question: Desktop malware may not represent a direct threat to ________- or
PLC-based equipment, but practical attacks exist on these systems.
Ans: SCADA
Question: True or False? In requirement-based security, we identify and
prioritize our security needs in a risk assessment process.
, Page | 2
Correct!
Ans: True
Question: Car ignition locks are an example of what type of decision?
Ans: Rule-based
Question: Both forms of the RMF illustrate a(n) _______ engineering process
as a way to plan, design, and build a complicated system.
Ans: systems
Question: True or False? The security process and the Information
engineering process find their origin in the concept of Continuous
Improvement.
Ans: False
Question: True or False? A supervisory control and data acquisition (SCADA)
device is a computer that controls motors, valves, and other devices in
industrial applications.
Ans: True
Question: A security decision, such as locking your vehicle when not in use, is
an example of:
, Page | 3
Ans: rule-based security.
Question: Which of the following is an example of a rule-based security
decision?
Ans: Locking a car's ignition
Question: Which of the following is an example of security theater?
Ans: Installing a fake video camera
Question: True or False? The term "security theater" refers to security
measures intended to make potential victims feel safe and secure without
regard to their effectiveness.
Correct!
Ans: True
Question: Risk Management Framework is a way to assess _______________
risks when developing large-scale computer systems.
Ans: cybersecurity
Question: True or False? Security Category RMF begins with a high-level
estimate of the impact caused by cyber security failures.
Ans: True