Question 6 of 78

What kind of data could be found on a historian?

Answer

Suggested Answer

The suggested answer is A.

Question 7 of 78

Which of the following can an attacker gain by obtaining PLC logic project files for a SCADA system?

Answer

Suggested Answer

The suggested answer is B.

Question 8 of 78

Which control helps prevent threats to Integrity?

Answer

Suggested Answer

The suggested answer is D.

Question 9 of 78

What mechanism could help defeat an attacker's attempt to hide evidence of his/her actions on the target system?

Answer

Suggested Answer

The suggested answer is D.

Question 10 of 78

An attacker has a goal of obtaining information stored in an ICS. Why might the attacker focus his efforts on the operating system rather than the ICS application?

Answer

Suggested Answer

The suggested answer is D.