Challenge - 5 Problems
IEC 60870-5 Protocol Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate1:30remaining
Understanding IEC 60870-5-101 Frame Structure
Which part of the IEC 60870-5-101 frame contains the control field that manages the communication commands?
Attempts:
2 left
💡 Hint
Think about which part tells the device what action to perform.
✗ Incorrect
The control field in IEC 60870-5-101 frames carries commands and responses that manage the communication session.
💻 Command Output
intermediate1:30remaining
Output of IEC 60870-5-104 Connection Establishment Command
What is the expected response code from a server after receiving a valid STARTDT (Start Data Transfer) command in IEC 60870-5-104?
SCADA systems
Client sends: STARTDT (Start Data Transfer) command Server responds:
Attempts:
2 left
💡 Hint
The server must confirm the start of data transfer.
✗ Incorrect
After receiving STARTDT, the server replies with STARTDT CON to confirm data transfer start.
❓ Troubleshoot
advanced2:00remaining
Diagnosing IEC 60870-5-101 Communication Failure
A SCADA master device repeatedly fails to receive responses from a slave device over IEC 60870-5-101. Which of the following is the most likely cause?
Attempts:
2 left
💡 Hint
Check frame integrity and error detection.
✗ Incorrect
The checksum field ensures frame integrity. Missing checksum causes the slave to reject frames, leading to no response.
🔀 Workflow
advanced2:00remaining
Sequence of Commands for Data Transfer in IEC 60870-5-104
What is the correct sequence of commands exchanged between a client and server to start data transfer in IEC 60870-5-104?
Attempts:
2 left
💡 Hint
Focus on the minimal handshake to start data transfer.
✗ Incorrect
The client initiates with STARTDT, and the server confirms with STARTDT CON. TESTFR is used later for link testing.
✅ Best Practice
expert2:30remaining
Best Practice for Secure IEC 60870-5-104 Communication
Which of the following is the best practice to enhance security when deploying IEC 60870-5-104 protocol in a critical SCADA network?
Attempts:
2 left
💡 Hint
Think about protecting data in transit over networks.
✗ Incorrect
Using VPN tunnels encrypts data and protects against interception, which is critical for SCADA security.