1. Cybersecurity in smart grids refers to:
(A) Protecting digital systems and communication networks from cyber threats
(B) Improving voltage regulation
(C) Enhancing power factor
(D) Reducing transformer losses
2. The main goal of cybersecurity in the power grid is to:
(A) Ensure confidentiality, integrity, and availability of data
(B) Reduce automation
(C) Limit data access to no one
(D) Disconnect the grid remotely
3. The confidentiality aspect of cybersecurity ensures:
(A) Information is accessed only by authorized users
(B) Data is always encrypted
(C) System downtime
(D) Open access for all users
4. The integrity aspect of cybersecurity refers to:
(A) Preventing unauthorized modification of data
(B) Allowing open editing of data
(C) Removing encryption
(D) Disconnecting users
5. The availability aspect of cybersecurity ensures:
(A) Systems and data are accessible to authorized users when needed
(B) Restricted access always
(C) Permanent offline status
(D) Manual operation only
6. A cyberattack in the smart grid could lead to:
(A) Grid instability and blackouts
(B) Reduced reliability of communication
(C) Improved security
(D) Constant voltage output
7. The most common cyber threats to smart grids are:
(A) Malware, phishing, and denial-of-service (DoS) attacks
(B) Line faults
(C) Equipment aging
(D) Mechanical failures
8. A Denial-of-Service (DoS) attack aims to:
(A) Disrupt or block network services by overwhelming systems
(B) Encrypt data for safety
(C) Enhance bandwidth
(D) Improve latency
9. Phishing in cybersecurity involves:
(A) Tricking users to reveal confidential information
(B) Encrypting data for protection
(C) Physically damaging the grid
(D) Reducing latency
10. A malware attack can:
(A) Damage, disable, or take control of system operations
(B) Improve data accuracy
(C) Strengthen encryption
(D) Monitor power usage legally
11. Firewalls are used in grid cybersecurity to:
(A) Block unauthorized network access
(B) Cool network servers
(C) Amplify signals
(D) Filter harmonic distortion
12. Encryption in cybersecurity is used to:
(A) Protect data during transmission by converting it into unreadable form
(B) Improve voltage stability
(C) Increase power factor
(D) Regulate frequency
13. Authentication ensures that:
(A) Only verified users or devices access the system
(B) All users have open access
(C) Data is automatically deleted
(D) Communication is disabled
14. The Intrusion Detection System (IDS) in grid security is used to:
(A) Monitor network activity for unauthorized access or anomalies
(B) Increase signal strength
(C) Disconnect faulty lines
(D) Measure load flow
15. SCADA systems in grid monitoring are vulnerable to:
(A) Cyberattacks exploiting communication links
(B) Overvoltage faults only
(C) Line losses
(D) High temperature
16. Grid monitoring refers to:
(A) Continuous observation and analysis of power system parameters
(B) Manual disconnection of lines
(C) Fixed time data recording only
(D) Reducing grid automation
17. Phasor Measurement Units (PMUs) are used in grid monitoring to:
(A) Measure voltage and current phasors in real time
(B) Control reactive power flow
(C) Replace transformers
(D) Reduce harmonics
18. The system that collects and visualizes PMU data is known as:
(A) Wide Area Monitoring System (WAMS)
(B) Load Flow System
(C) SCADA Controller
(D) Local Distribution Monitor
19. Real-time monitoring in grids helps in:
(A) Early fault detection and stability control
(B) Increasing manual operation
(C) Eliminating protection relays
(D) Ignoring communication delays
20. Big Data Analytics in grid monitoring is used for:
(A) Analyzing large volumes of grid data for pattern recognition and prediction
(B) Manual fault location
(C) Replacing meters
(D) Slowing data transmission
21. Anomaly detection in smart grid cybersecurity is used to:
(A) Identify abnormal data patterns indicating potential attacks
(B) Measure transformer losses
(C) Reduce reactive power
(D) Fix frequency deviations
22. The main challenge in securing smart grids is:
(A) Integration of IT and OT (Operational Technology) systems
(B) Reducing consumer load
(C) Improving insulation
(D) Increasing circuit impedance
23. Data integrity attacks on the grid target:
(A) Manipulation of measurement or control data
(B) Reducing data redundancy
(C) Improving accuracy
(D) Eliminating communication
24. Man-in-the-Middle (MITM) attacks involve:
(A) Intercepting and altering communication between two systems
(B) Directly overloading transformers
(C) Blocking energy storage
(D) Changing voltage references
25. Role-based access control (RBAC) in cybersecurity means:
(A) Users are granted access based on their job responsibilities
(B) Everyone gets admin privileges
(C) No access restrictions
(D) Fixed passwords for all
26. Patch management is essential in grid cybersecurity to:
(A) Update and fix software vulnerabilities regularly
(B) Increase data redundancy
(C) Reduce communication bandwidth
(D) Modify voltage limits
27. Event logging in grid monitoring helps:
(A) Track system activities for analysis and threat detection
(B) Disconnect circuits
(C) Generate reactive power
(D) Regulate frequency
28. Resilience in cybersecurity means:
(A) The ability of the system to withstand and recover from cyberattacks
(B) Operating without encryption
(C) Disabling redundancy
(D) Manual grid balancing
29. Artificial Intelligence (AI) in grid monitoring is used for:
(A) Predicting faults, optimizing response, and enhancing situational awareness
(B) Manual system repair
(C) Hardware cooling
(D) Transformer testing only
30. The ultimate goal of cybersecurity and monitoring in smart grids is to:
(A) Ensure secure, reliable, and continuous power system operation
(B) Eliminate communication systems
(C) Reduce automation
(D) Operate grids manually