ISA Interchange

Welcome to the official blog of the International Society of Automation (ISA).

This blog covers numerous topics on industrial automation such as operations & management, continuous & batch processing, connectivity, manufacturing & machine control, and Industry 4.0.

The material and information contained on this website is for general information purposes only. ISA blog posts may be authored by ISA staff and guest authors from the automation community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

AutoQuiz: What Network Security Technology Does Not Use Encryption?

AutoQuiz is edited by Joel Don, ISA's social media community manager.

This automation industry quiz question comes from the ISA Certified Automation Professional (CAP) certification program. ISA CAP certification provides a non-biased, third-party, objective assessment and confirmation of an automation professional's skills. The CAP exam is focused on direction, definition, design, development/application, deployment, documentation, and support of systems, software, and equipment used in control systems, manufacturing information systems, systems integration, and operational consulting. Click this link for more information about the CAP program.

Which of the following network security technologies does not use encryption?

a) digital signatures
b) virtual local area network (VLAN)
c) virtual private network (VPN)
d) wired equivalent privacy (WEP)
e) none of the above

Answer A is not correct because digital signatures are encrypted. Information signed, such as a contract or data record, is compressed via a cryptographic one-way function (a hash) into a short bit string.

Answer C is not correct because a virtual private network (VPN) is an encrypted private network that operates as an overlay on a public infrastructure.

Answer D is not correct because Wired Equivalent Privacy (WEP) is an encryption algorithm for IEEE 802.11 wireless networks, originally intended to provide data confidentiality comparable to a wired network.

The correct answer is B. A virtual local area network (VLAN) is achieved through configuration of Ethernet switches and not encryption. It divides a physical network into smaller logical networks to increase performance, improve manageability, and simplify network design.

Reference: ANSI/ISA-TR99.00.01-2400 Security Technologies for Manufacturing and Control Systems

About the Editor
Joel Don is the community manager for ISA and is an independent content marketing, social media and public relations consultant. Prior to his work in marketing and PR, Joel served as an editor for regional newspapers and national magazines throughout the U.S. He earned a master's degree from the Medill School at Northwestern University with a focus on science, engineering and biomedical communications, and a bachelor of science degree from UC San Diego.

Connect with Joel
LinkedInTwitterEmail

 

Joel Don
Joel Don
Joel Don is an independent content marketing, social media and public relations consultant. Prior to his work in marketing and PR, Joel served as an editor for regional newspapers and national magazines throughout the U.S. He earned a master's degree from the Medill School at Northwestern University with a focus on science, engineering and biomedical marketing communications, and a bachelor of science degree from UC San Diego.

Related Posts

IDM Can Improve Plant Reliability and Reduce Downtime

There are hundreds of smart instruments including sensors and final control elements installed in medium-...
Bakhtiar Pour Ahmad Aug 12, 2022 5:30:00 AM

The Opportunities and Obstacles in Using Automation for PCB Assembly

Automation has revolutionized the printed circuit board (PCB) industry with enhanced product reliability ...
Suresh Patel Aug 9, 2022 5:30:00 AM

What are the Biggest Mistakes You Have Seen? Part 4

The following discussion is part of an occasional series showcasing the ISA Mentor Program, authored by G...
Greg McMillan Aug 5, 2022 5:30:00 AM