SCADA Site Security and Access Controls
SKILLSET
No description available
Related Questions
- Identification, Authentication & Authorization should default to:
- Consider the following example: 2 pipelines, East and West. Operator role restricts what actions an operator can do on which pipeline. Which access control model can restrict operators to operating only one of the two pipelines?
- Viewing, using, or altering data or devices functions are forms of:
- TRUE or FALSE: Single-factor authentication is an accepted good practice for access to ICS applications from outside the ICS firewall
- What is the largest weakness of single-factor physical or token authentication?
- The purpose of identification is to implement authorization and provide:
- Granting access to resources based on criteria is defined as:
- Select the characteristic that does NOT apply to Zone 3 & 4 windows:
- TRUE or FALSE: For network service authentication purposes, passwords should be avoided
- All users that are authorized to login to this HMI in the control center have administrative privileges. This is an example of which access control model?