This repository has been archived by the owner on Aug 21, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
120 additions
and
6 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,114 @@ | ||
<style type="text/css">ol { list-style-type: upper-alpha; }</style> | ||
|
||
# Quiz 14: Resilience engineering | ||
|
||
## Problem 1 | ||
|
||
> Which of the following are resilience activities involved in the detection of | ||
and recovery from system problems. | ||
> | ||
> - Resistance | ||
> - Recovery | ||
> - Recognition | ||
> - Reinstatement | ||
- Resistance | ||
- Recovery | ||
- Recognition | ||
- Reinstatement | ||
|
||
## Problem 2 | ||
|
||
> In designing a resilient system, you have to assume that system failures or | ||
penetration by an attacker will occur, and you have to include redundant and | ||
diverse features to cope with these adverse events. | ||
> | ||
> 1. True | ||
> 2. False | ||
**A.** True | ||
|
||
## Problem 3 | ||
|
||
> You should not design operational processes to be flexible and adaptable | ||
because operators and system managers may sometimes have to break rules and | ||
"work around" the defined process. | ||
> | ||
> 1. True | ||
> 2. False | ||
**B.** False | ||
|
||
## Problem 4 | ||
|
||
> ______ involves simulating possible system failures and cyberattacks to test | ||
whether the resilience plans that have been drawn up work as expected. | ||
> | ||
> 1. Asset classification | ||
> 2. Resilience Testing | ||
> 3. Threat recognition | ||
> 4. Operational and management processes | ||
**B.** Resilience Testing | ||
|
||
## Problem 5 | ||
|
||
> Critical services are defined as services that are essential if a system is to | ||
ensure its primary purpose. | ||
> | ||
> 1. True | ||
> 2. False | ||
**A.** True | ||
|
||
## Problem 6 | ||
|
||
> Cybersecurity is concerned with all of an organization's IT assets from | ||
networks through to application systems. | ||
> | ||
> 1. True | ||
> 2. False | ||
**A.** True | ||
|
||
## Problem 7 | ||
|
||
> Resilience engineering does not focus on avoiding failure but rather on | ||
accepting the reality that failures will occur. | ||
> | ||
> 1. True | ||
> 2. False | ||
**A.** True | ||
|
||
## Problem 8 | ||
|
||
> Fundamentally, resilience engineering is a technical rather than a | ||
sociotechnical activity. | ||
> | ||
> 1. True | ||
> 2. False | ||
**B.** False | ||
|
||
## Problem 9 | ||
|
||
> Human error is rarely the cause of accidents in safety critical systems. | ||
> | ||
> 1. True | ||
> 2. False | ||
**B.** False | ||
|
||
## Problem 10 | ||
|
||
> Resilience planning should be based on the assumption that ______ systems will | ||
be subjected to cyberattacks by malicious insiders and outisders and that some | ||
of these attacks will be successful. | ||
> | ||
> 1. offline | ||
> 2. defensive | ||
> 3. resilience planning should not be based on the assumptions | ||
> 4. networked | ||
**D.** networked |