ISA Interchange

Welcome to the official blog of the International Society of Automation (ISA).

This blog covers numerous topics on industrial automation such as operations & management, continuous & batch processing, connectivity, manufacturing & machine control, and Industry 4.0.

The material and information contained on this website is for general information purposes only. ISA blog posts may be authored by ISA staff and guest authors from the automation community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

AutoQuiz: What Network Security Technology Does Not Use Encryption?

AutoQuiz is edited by Joel Don, ISA's social media community manager.

This automation industry quiz question comes from the ISA Certified Automation Professional (CAP) certification program. ISA CAP certification provides a non-biased, third-party, objective assessment and confirmation of an automation professional's skills. The CAP exam is focused on direction, definition, design, development/application, deployment, documentation, and support of systems, software, and equipment used in control systems, manufacturing information systems, systems integration, and operational consulting. Click this link for more information about the CAP program.

Which of the following network security technologies does not use encryption?

a) digital signatures
b) virtual local area network (VLAN)
c) virtual private network (VPN)
d) wired equivalent privacy (WEP)
e) none of the above

Answer A is not correct because digital signatures are encrypted. Information signed, such as a contract or data record, is compressed via a cryptographic one-way function (a hash) into a short bit string.

Answer C is not correct because a virtual private network (VPN) is an encrypted private network that operates as an overlay on a public infrastructure.

Answer D is not correct because Wired Equivalent Privacy (WEP) is an encryption algorithm for IEEE 802.11 wireless networks, originally intended to provide data confidentiality comparable to a wired network.

The correct answer is B. A virtual local area network (VLAN) is achieved through configuration of Ethernet switches and not encryption. It divides a physical network into smaller logical networks to increase performance, improve manageability, and simplify network design.

Reference: ANSI/ISA-TR99.00.01-2400 Security Technologies for Manufacturing and Control Systems

About the Editor
Joel Don is the community manager for ISA and is an independent content marketing, social media and public relations consultant. Prior to his work in marketing and PR, Joel served as an editor for regional newspapers and national magazines throughout the U.S. He earned a master's degree from the Medill School at Northwestern University with a focus on science, engineering and biomedical communications, and a bachelor of science degree from UC San Diego.

Connect with Joel
LinkedInTwitterEmail

 

Joel Don
Joel Don
Joel Don is an independent content marketing, social media and public relations consultant. Prior to his work in marketing and PR, Joel served as an editor for regional newspapers and national magazines throughout the U.S. He earned a master's degree from the Medill School at Northwestern University with a focus on science, engineering and biomedical marketing communications, and a bachelor of science degree from UC San Diego.

Related Posts

Checking In With Mimo, ISA's Large Language Model Trained on ISA Content

Over the summer of 2024, the International Society of Automation (ISA) announced a large language model (...
Kara Phelps Nov 15, 2024 7:00:00 AM

Ask the Automation Pros: The Use of Artificial Intelligence in Process Control

The following discussion is part of an occasional series, "Ask the Automation Pros," authored by Greg McM...
Greg McMillan Nov 12, 2024 4:30:00 PM

Protecting Electrical Terminal Blocks From Tampering

Electrical terminal blocks are a common sight in the automation world. Usually mounted on DIN rail in ind...
Anna Goncharova Nov 8, 2024 10:30:00 AM