Question 6 of 78What kind of data could be found on a historian?
Correct Answer: A
Question 7 of 78Which of the following can an attacker gain by obtaining PLC logic project files for a SCADA system?
Correct Answer: B
Question 8 of 78Which control helps prevent threats to Integrity?
Correct Answer: D
Question 9 of 78What mechanism could help defeat an attacker's attempt to hide evidence of his/her actions on the target system?
Correct Answer: D
Question 10 of 78An attacker has a goal of obtaining information stored in an ICS. Why might the attacker focus his efforts on the operating system rather than the ICS application?