Which is the BEST deployment system for malicious code protection?
Available Choices (select all choices that are correct)
What does the System under Consideration (SuC) include in the context of ISA/IEC 62443 risk assessment?
If a U.S. federal agency must comply with mandatory cybersecurity requirements under law, which document would they be required to follow?
To which category of the ISA-62443 (IEC 62443) series does the document titled “Patch management in the IACS environment” belong?
Which is a commonly used protocol for managing secure data transmission on the Internet?
Available Choices (select all choices that are correct)
What is recommended to use between the plant floor and the rest of the company networks?
Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?
Under User Access Control (SP Element 6), which of the following is included in USER 1 — Identification and Authentication?
Which of the following provides the overall conceptual basis in the design of an appropriate security program?
Available Choices (select all choices that are correct)
Which is the PRIMARY reason why Modbus over Ethernet is easy to manaqe in a firewall?
Available Choices (select all choices that are correct)
What is the primary audience for Part 2-5 of the ISA/IEC 62443 Series - Policies & Procedures group of standards?
Which is NOT a potential consequence for organizations that fail to prioritize control system security?
An industrial facility wants to ensure that only authorized systems reach its PLCs while minimizing disruption to time-sensitive control processes. Which type of firewall would BEST suit this need?
How should CSMS organizational responsibilities or training be handled over time?
A company needs to create a standardized interface for exchanging real-time plant data between heterogeneous control devices while maintaining a structured organization of data elements such as folders, classes, and methods. Which feature of OPC supports this requirement?
If an industrial control system experiences frequent unexpected shutdowns causing downtime, which SP Element activities should be reviewed to improve system availability?
Which is a reason for
and physical security regulations meeting a mixed resistance?
Available Choices (select all choices that are correct)
What programs are MOST effective if they are tailored to the audience, consistent with company policy, and communicated regularly?
What programs are MOST effective if they are tailored to the audience, consistent with company policy, and communicated regularly?
An industrial facility wants to ensure that only authorized communication reaches its PLCs while minimizing disruption to time-sensitive control processes. Which type of firewall would BEST suit this need?
Why is segmentation from non-IACS zones important in Network & Communication Security (SP Element 3)?
Which part of the ISA/IEC 62443 series describes a methodology to develop quantitative metrics?
At Layer 4 of the Open Systems Interconnection (OSI) model, what identifies the application that will handle a packet inside a host?
Available Choices (select all choices that are correct)
Which is an important difference between IT systems and IACS?
Available Choices (select all choices that are correct)
Which Security Level (SL) would be MOST appropriate for a system that requires protection against attackers with high motivation and extended resources using sophisticated means?
Which of the following is an element of security policy, organization, and awareness?
Available Choices (select all choices that are correct)
Which of the following is an element of monitoring and improving a CSMS?
Available Choices (select all choices that are correct)
What does the abbreviation CSMS round in ISA 62443-2-1 represent?
Available Choices (select all choices that are correct)
Which of the following activities is NOT listed under the “Patch Testing” phase in the asset owner requirements?
What are the three main components of the ISASecure Integrated Threat Analysis (ITA) Program?
Available Choices (select all choices that are correct)
Which steps are included in the ISA/IEC 62443 assess phase?
Available Choices (select all choices that are correct)
An industrial control system requires strong protection against intentional violations using sophisticated means and moderate skills. According to the Security Level (SL) definitions, which SL should be targeted?
Which characteristic is MOST closely associated with the deployment of a demilitarized zone (DMZ)?
Available Choices (select all choices that are correct)
Why is patch management more difficult for IACS than for business systems?
Available Choices (select all choices that are correct)
A national standards body wants to represent its country’s interests at an international level and adopt global standards locally. What role does this organization fulfill?
What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?
What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?
Available Choices (select all choices that are correct)
Who is responsible for defining the tolerable residual cybersecurity risk as an input requirement for all activities?
Which of the following is NOT listed as a potential consequence of compromising IACS according to the ISA99 Committee scope?
Which of the following starts at a high level and includes all ANSI/ISA-95 Level 0,1,2,3,4 equipment and information systems?
A manufacturing plant has inconsistent cybersecurity processes that vary widely between shifts and teams. According to the maturity levels described in ISA/IEC 62443-2-1, how would this situation be classified?
What is the FIRST step required in implementing ISO 27001?
Available Choices (select all choices that are correct)
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
In a defense-in-depth strategy, what is the purpose of role-based access control?
Available Choices (select all choices that are correct)