SCADA Site Security and Access Controls
SKILLSET
No description available
Related Questions
- Which of the following is NOT a valid access control model?
- Security Zone Two (Work Zone) allows:
- If using non-encrypted protocols to transmit passwords cannot be avoided, what compensating control should be implemented?
- Granting access to resources based on criteria is defined as:
- For SCADA identification, it is important to identify the user, and:
- TRUE or FALSE: In some cases, it may be considered necessary to make the control center blast-proof
- Select the characteristic that does NOT apply to Zone 3 & 4 windows:
- Viewing, using, or altering data or devices functions are forms of:
- Select the statement that is NOT accurate about Role Based Access Control
- Proving the identity claim is defined as: