SCADA Site Security and Access Controls
SKILLSET
No description available
Related Questions
- Which of the following is NOT one of the attributes of a defense-in-depth solution to physical security?
- Traditional lock and key access is more secure when combined with:
- Identification, Authentication & Authorization should default to:
- Voice recognition is a type of authentication based on something you:
- TRUE or FALSE: Control system vendor-supplied passwords are usually hard to guess or are changed frequently
- TRUE or FALSE: Single-factor authentication is an accepted good practice for access to ICS applications from outside the ICS firewall
- If using non-encrypted protocols to transmit passwords cannot be avoided, what compensating control should be implemented?
- TRUE or FALSE: A password audit record should be maintained separately from the control system
- Mobile field device can only gain access within the confines of the substation. This is an example of which access control model?
- We must delay the attack: