Question 6 of 78
What kind of data could be found on a historian?
Correct Answer: A

Question 7 of 78
Which of the following can an attacker gain by obtaining PLC logic project files for a SCADA system?
Correct Answer: B

Question 8 of 78
Which control helps prevent threats to Integrity?
Correct Answer: D

Question 9 of 78
What mechanism could help defeat an attacker's attempt to hide evidence of his/her actions on the target system?
Correct Answer: D

Question 10 of 78
An attacker has a goal of obtaining information stored in an ICS. Why might the attacker focus his efforts on the operating system rather than the ICS application?
Correct Answer: D