What distinguishes Operational Technology (OT) from Information Technology (IT) in a building management context?
OT Cyber Security Audit Workshop

Quiz
•
Information Technology (IT)
•
Professional Development
•
Easy
John Lee
Used 2+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
OT focuses on data processing, while IT is responsible for physical process control.
OT manages physical processes like HVAC and lighting, whereas IT focuses on data processing and network management.
OT integrates digital, computational systems in data centers, whereas IT manages remote access to building environments.
OT uses isolated networks for critical data management, while IT manages automation of physical assets
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best represents the purpose of OT Governance in the context of a real estate company?
To centralize IT and OT teams under a single control structure for unified governance.
To align OT practices with corporate, security, and compliance goals while ensuring operational efficiency and safety.
To develop separate compliance policies for OT and IT to avoid security overlap
To ensure OT systems prioritize data privacy over physical safety in building operations
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In OT Asset Management, which practice is most effective for maintaining visibility of all OT assets within a building?
Conducting periodic physical walkthroughs to document changes in asset configurations.
Relying solely on automated inventory management systems for real-time data
Implementing a hybrid approach combining passive, active, and manual methods for comprehensive asset discovery.
Using network segmentation to isolate and inventory only high-risk assets.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the OT Risk Management framework, which approach best mitigates risks for critical OT assets?
Ensuring regular IT audits cover all OT risks, given the similar threat profiles of both systems.
Applying a continuous improvement model to adjust security controls according to emerging threats and operational updates
Focusing solely on physical access controls to secure OT environments against cyber threats
Prioritizing compliance with only one primary cybersecurity standard, such as ISO 27001
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a significant challenge of managing OT security in a multi-vendor environment?
Centralizing all security controls to apply a unified protocol across all vendor technologies
Limited supply chain dependencies, reducing the complexity of managing OT assets
Ensuring standardized security compliance across diverse vendor technologies and systems.
Increasing visibility through vendor-specific, proprietary tools that integrate seamlessly
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a key characteristic of effective security controls for OT systems?
Prioritizing data confidentiality over system availability and safety.
Emphasizing a layered security approach that includes both physical and cybersecurity measures.
Using centralized IT controls without modifications for OT needs.
Limiting access controls to external systems only, reducing in-building restrictions
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When managing OT incidents, what practice is essential for reducing operational disruptions?
Rebooting affected OT systems promptly to restore functionality
Ensuring OT incident response plans align with general IT response protocols.
Isolating compromised OT components without disrupting core physical processes
Implementing continuous updates during incidents to strengthen security
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the purpose of regular OT audits in a property management setting?
To ensure that OT and IT systems are fully integrated without security exceptions
To verify compliance with OT cybersecurity policies and identify security gaps across building systems
To implement real-time security controls in response to immediate OT threats
To establish centralized control over all OT assets, reducing on-site autonomy
Similar Resources on Quizizz
10 questions
Embedding Federated Security Testing Across the SDLC Quiz

Quiz
•
Professional Development
8 questions
Web Application Security Quiz

Quiz
•
Professional Development
10 questions
Networking Tech Talk Quiz

Quiz
•
Professional Development
10 questions
Activity 2 - ISMS

Quiz
•
Professional Development
10 questions
Cloud Practitioner Essentials Quiz

Quiz
•
Professional Development
10 questions
Microsoft IT Pro Community Meetup - November

Quiz
•
Professional Development
10 questions
Post Test - Good Project Management for Aggressive Organization

Quiz
•
Professional Development
9 questions
ISC2 - Domain 2 - Incident Response

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade