Which statement correctly describes the difference between authentication and authorization in a SCADA system?
Think about logging in first, then checking permissions.
Authentication confirms the user's identity, while authorization checks their permissions.
What is the output of the following SCADA system command when a user enters correct credentials?
login --user=operator --password=correctpass
Correct credentials should allow access.
When credentials are correct, the system grants access and confirms login success.
Which configuration snippet correctly assigns the 'engineer' role permission to modify control parameters in a SCADA system?
Look for permissions that include modifying controls.
The 'modify_controls' permission allows the engineer role to change control parameters, which is required.
A user with the 'technician' role tries to access the alarm settings but receives 'Access Denied'. Which is the most likely cause?
Consider role permissions related to the requested resource.
Access denied usually means the role does not have the required permission, not authentication or system status issues.
What is the correct order of steps to securely set up a new user in a SCADA system?
Think about creating the user first, then assigning roles, then setting password, then testing.
The user must be created first, then roles assigned, password set, and finally tested to ensure access.