0
0
SCADA systemsdevops~20 mins

User authentication and authorization in SCADA systems - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
SCADA Security Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
1:30remaining
Understanding Authentication vs Authorization

Which statement correctly describes the difference between authentication and authorization in a SCADA system?

AAuthentication and authorization both verify the user's identity only.
BAuthentication determines what the user can access; authorization verifies who the user is.
CAuthorization is done before authentication in the access process.
DAuthentication verifies who the user is; authorization determines what the user can access.
Attempts:
2 left
💡 Hint

Think about logging in first, then checking permissions.

💻 Command Output
intermediate
1:00remaining
Result of User Login Command

What is the output of the following SCADA system command when a user enters correct credentials?

SCADA systems
login --user=operator --password=correctpass
ALogin failed: User not found.
BError: Invalid password.
CLogin successful: Access granted to operator dashboard.
DSystem error: Unable to connect to authentication server.
Attempts:
2 left
💡 Hint

Correct credentials should allow access.

Configuration
advanced
2:00remaining
Configuring Role-Based Access Control (RBAC)

Which configuration snippet correctly assigns the 'engineer' role permission to modify control parameters in a SCADA system?

A
[roles]
engineer=read,write,view_only
B
[roles]
engineer=read,write,modify_controls
C
[roles]
engineer=read,execute_scripts
D
[roles]
engineer=read,write,delete_logs
Attempts:
2 left
💡 Hint

Look for permissions that include modifying controls.

Troubleshoot
advanced
1:30remaining
Diagnosing Access Denied Error

A user with the 'technician' role tries to access the alarm settings but receives 'Access Denied'. Which is the most likely cause?

AThe technician role lacks permission to modify alarm settings.
BThe user's password has expired.
CThe SCADA system is offline.
DThe user is not authenticated.
Attempts:
2 left
💡 Hint

Consider role permissions related to the requested resource.

🔀 Workflow
expert
2:30remaining
Correct Sequence for Secure User Access Setup

What is the correct order of steps to securely set up a new user in a SCADA system?

A1,2,3,4
B2,1,3,4
C3,1,2,4
D1,3,2,4
Attempts:
2 left
💡 Hint

Think about creating the user first, then assigning roles, then setting password, then testing.