Leak Detection
Cybersecurity
Health and Safety
Alarm Management
SCADA
100

The leak detection method that consists of calculating the difference between volume of fluid entering the pipe and volume of fluid leaving the pipe

What is “Volume balance”?

100

In WIFI technology, it is still transmitted and discoverable, even when broadcast of it is disabled.

The SSID.  The (Service Set Identifier) must still be used in transmissions between clients and the WAP and is easily discoverable with a wireless sniffer.

100

The number of wrungs on the top of a ladder that must not be used to work from

What is 2?

100

This notification type represents an abnormal operating condition that requires a timely operator response

What is an alarm?

100

What SCADA stands for.

What is Supervisory, Control and Data Acquisition

200

The highest flying form of leak detection.

What is “aerial patrol”?

200

The number of days it takes to crack an 8 character long password with a basic hardware.

What is 1 day or less?

200

When lifting heavy objects, what you should never bend at

What is the waist?

200

A means to convey the seriousness of an alarm, based on time to respond and consequence of inaction

What is an alarm priority?

200

This database stores information on the users and components of a domain.

What is Active Directory?

300

If the leak detection balance is rising and falling cyclically every 24 hours, what type of sensor is having what kind of failure?

What is a temperature sensor is changing with ambient temperature?

300

The main reason that the MySpace data breach that long ago affected roughly 380 million accounts is still very much a concern today.

What is the poor practice of people reusing their passwords? (Email addresses and passwords were within that data.)

300

The form that must be filled in and submitted when medical treatment is required beyond first aid

What is Workers Compensation Board (WCB) form?

To report a workplace injury in Alberta and Saskatchewan:

• Step 1: Tell your employer the details of your injury.  After receiving notice, the employer must report the incident to the WCB within the provincial timeline if medical treatment is required, or if the Worker cannot do their job beyond the day of incident.

• Step 2: Tell your doctor you were injured at work.

• Step 3: Tell the WCB. Obtain forms from your employer or any WCB office, and once completed, immediately send your Report of Injury Form to the WCB

300

A classification of nuisance alarms that annunciate and clear at least 3 times in one minute

What is a chattering alarm?

300

The four core services that the OASys DNA 7.5 Network Management Console displays.

What is Realtime, Historical Services, ISPS (Inter-System PubSub), RCS (Remote client service)?

400

How long a control center operator has to shut down a line flowing at 100 m3/h if there is an unexplained leak alarm.

What is “ 2 hours”?

400

The method used to bypass even the best security practices.

What is social engineering?

400

According to IPLs hearing conservation standard, the suspected noise level at a work site in which noise measurements must be taken.

What is 80dBA? (e.g. the sound of a vacuum cleaner or diesel truck)

400

This type of nuisance alarm are in an alarm state continuously for more than 24 hours

What is a stale alarm?

400

The three main components of a control system architecture.

What are:

RTU (Remote Telemetry units), PLC (Programmable logic controls,

Network data communication

GUI (graphical user interface) HMI (Human machine interface)

500

The retention period changed/defined for all leak detection records within CSA Z662 Annex E in 2019.

What is the “life of pipeline”?

500

The principle that can prevent malware from assuming full administrative capabilities, by limiting user account privileges.

What is the principle of least privilege?


500

When working alone at the ECR for an entire day, the time(s) you must check-in with your contact at a minimum?

What is in the morning, at mid-day, and at the end of the day?

500

This database contains the authorized list of rationalized alarms and their associated configuration

What is the Master Alarm Database?

500

The definitions of 5 of 10 types networks:

  1. PAN
  2. LAN
  3. WLAN
  4. CAN
  5. MAN
  6. WAN
  7. SAN
  8. POLAN
  9. EPN
  10. VPN

11 Types of Networks in Use Today:

1. Personal Area Network (PAN)

The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around one person in one building. These types of networks are typically found in small offices or residences, and are managed by one person or organization from a single device.

2. Local Area Network (LAN)

We’re confident that you’ve heard of these types of networks before – LANs are the most frequently discussed networks, one of the most common, one of the most original and one of the simplest types of networks. LANs connect groups of computers and low-voltage devices together across short distances (within a building or between a group of two or three buildings in close proximity to each other) to share information and resources. Enterprises typically manage and maintain LANs.

Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data.

3. Wireless Local Area Network (WLAN)

Functioning like a LAN, WLANs make use of wireless network technology, such as WiFi. Typically seen in the same types of applications as LANs, these types of networks don’t require that devices rely on physical cables to connect to the network.

4. Campus Area Network (CAN)

Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types of networks are typically seen in universities, large K-12 school districts or small businesses. They can be spread across several buildings that are fairly close to each other so users can share resources.


5. Metropolitan Area Network (MAN)

These types of networks are larger than LANs but smaller than WANs – and incorporate elements from both types of networks. MANs span an entire geographic area (typically a town or city, but sometimes a campus). Ownership and maintenance is handled by either a single person or company (a local council, a large company, etc.).

6. Wide Area Network (WAN)

Slightly more complex than a LAN, a WAN connects computers together across longer physical distances. This allows computers and low-voltage devices to be remotely connected to each other over one large network to communicate even when they’re miles apart.

The Internet is the most basic example of a WAN, connecting all computers together around the world. Because of a WAN’s vast reach, it is typically owned and maintained by multiple administrators or the public.

7. Storage-Area Network (SAN)

As a dedicated high-speed network that connects shared pools of storage devices to several servers, these types of networks don’t rely on a LAN or WAN. Instead, they move storage resources away from the network and place them into their own high-performance network. SANs can be accessed in the same fashion as a drive attached to a server. Types of storage-area networks include converged, virtual and unified SANs.

8. System-Area Network (also known as SAN)

This term is fairly new within the past two decades. It is used to explain a relatively local network that is designed to provide high-speed connection in server-to-server applications (cluster environments), storage area networks (called “SANs” as well) and processor-to-processor applications. The computers connected on a SAN operate as a single system at very high speeds.

9. Passive Optical Local Area Network (POLAN)

As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated into structured cabling to overcome concerns about supporting traditional Ethernet protocols and network applications such as PoE (Power over Ethernet). A point-to-multipoint LAN architecture, POLAN uses optical splitters to split an optical signal from one strand of singlemode optical fiber into multiple signals to serve users and devices.

10. Enterprise Private Network (EPN)

These types of networks are built and owned by businesses that want to securely connect its various locations to share computer resources.

11. Virtual Private Network (VPN)

By extending a private network across the Internet, a VPN lets its users send and receive data as if their devices were connected to the private network – even if they’re not. Through a virtual point-to-point connection, users can access a private network remotely.