1. What is the primary purpose of the Purdue Model in industrial control systems (ICS)?
2. Which level of the Purdue Model contains the basic sensors, actuators, and other physical process devices?
3. Programmable Logic Controllers (PLCs) and Distributed Control Systems (DCS) typically reside at which level?
4. The boundary between the enterprise (IT) network and the industrial (OT) network is known as the:
5. What is located in Level 4 of the Purdue Model?
6. The concept of "segmentation" in the Purdue Model aims to:
7. Which level is responsible for supervisory control, such as HMIs and SCADA software?
8. A key security principle of the Purdue Model is that communication should generally NOT bypass levels. This is known as:
9. The Industrial Demilitarized Zone (IDMZ) is typically placed between which two levels?
10. What kind of systems would you find in Level 3, the Manufacturing Operations Management level?
11. Why is direct communication between the Enterprise Zone (Level 4/5) and the Control Zone (Level 0-2) discouraged?
12. Which of these is a common security control used within the IDMZ?
13. The "air gap" concept, while often discussed, is difficult to maintain in modern ICS. The Purdue Model offers a more practical approach through:
14. What does "OT" stand for in the context of the Purdue Model?
15. A historian server, which collects and stores large amounts of process data, is typically found in:
16. Which level is considered the most critical in terms of safety and real-time control?
17. A firewall rule allowing traffic from a Level 4 ERP system directly to a Level 1 PLC would be a violation of the Purdue Model's principles. True or False?
18. The "Safety Instrumented System" (SIS) operates independently but is often considered part of which level?
19. What is the main difference in priorities between IT and OT cybersecurity?
20. Level 5 in the Purdue Model represents the:
21. An engineering workstation used to program PLCs would typically be found at:
22. Implementing the Purdue Model helps achieve "Defense in Depth". What does this mean?
23. What is a major challenge when applying security patches in an OT environment?
24. A remote access solution for an external vendor needing to service a PLC should ideally terminate in the:
25. The Purdue Model is a conceptual framework, not a strict standard with mandatory compliance. True or False?
26. The flow of data in a well-architected Purdue Model is primarily:
27. Which industrial protocol would you most likely find at the lower levels (0, 1, 2) of the model?
28. Placing a data diode between the OT and IT network is a method to:
29. The convergence of IT and OT has made the Purdue Model:
30. A key goal of implementing the Purdue Model from a cybersecurity perspective is to reduce the:
Your email address will not be published. Required fields are marked *
Comment *
Name *
Email *
Website
Save my name, email, and website in this browser for the next time I comment.