What is the primary goal of the Assess phase in the IACS Cybersecurity Lifecycle?
Which of the following BEST describes a control system?
Which of the ISA 62443 standards focuses on the process of developing secure products?
Available Choices (select all choices that are correct)
What.are the two elements of the risk analysis category of an IACS?
Available Choices (select all choices that are correct)
Which policies and procedures publication is titled Patch Manaqement in the IACS Environment?
Available Choices (select all choices that are correct)
Which of the following BEST describes ‘Vulnerability’?
Which is the PRIMARY reason why Modbus over Ethernet is easy to manaqe in a firewall?
Available Choices (select all choices that are correct)
What is a requirement for product security development lifecycles?
Which of the following starts at a high level and includes all ANSI/ISA-95 Level 0,1,2,3,4 equipment and information systems?
Why were PLCs originally designed?
The Risk Analysis category contains background information that is used where?
Available Choices (select all choices that are correct)
What do the tiers in the NIST CSF represent?
Which of the following is the underlying protocol for Ethernet/IP?
Available Choices (select all choices that are correct)
Security Levels (SLs) are broken down into which three types?
Available Choices (select all choices that are correct)
Which of the following is the BEST example of detection-in-depth best practices?
Available Choices (select all choices that are correct)
Which is the implementation of PROFIBUS over Ethernet for non-safety-related communications?
Available Choices (select all choices that are correct)
What does a demilitarized zone (DMZ) provide in network security?
Which standard is recognized as part of the NIST CSF Informative References?
Which model describes relationships between assets within an industrial automation and control system?
How should CSMS organizational responsibilities or training be handled over time?
What type of security level defines what a component or system is capable of meeting?
Available Choices (select all choices that are correct)
How many security levels are in the ISASecure certification program?
Available Choices (select all choices that are correct)
Which of the following is an element of monitoring and improving a CSMS?
Available Choices (select all choices that are correct)
Which of the following provides the overall conceptual basis in the design of an appropriate security program?
Which of the following is an industry sector-specific standard?
Available Choices (select all choices that are correct)
Which factor drives the selection of countermeasures?
Available Choices (select all choices that are correct)
Which is a PRIMARY reason why network security is important in IACS environments?
Available Choices (select all choices that are correct)
What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?
What type of attack is characterized by encrypting an organization’s data and demanding payment for restoration?
Authorization (user accounts) must be granted based on which of the following?
Available Choices (select all choices that are correct)
What does Foundational Requirement 6 (FR 6) - Timely Response to Events (TRE) require?
Which U.S. Department is responsible for the Chemical Facility Anti-Terrorism Standards (CFATS)?
Which of the following is a cause for the increase in attacks on IACS?
Available Choices (select all choices that are correct)
What is one challenge associated with firewalls?
Which of the following is an example of separation of duties as a part of system development and maintenance?
Available Choices (select all choices that are correct)
Electronic security, as defined in ANSI/ISA-99.00.01:2007. includes which of the following?
Available Choices (select all choices that are correct)
Which of the following is an activity that should trigger a review of the CSMS?
Available Choices (select all choices that are correct)
What is recommended to use between the plant floor and the rest of the company networks?
What is the FIRST step required in implementing ISO 27001?
Available Choices (select all choices that are correct)
Why is patch management more difficult for IACS than for business systems?
Available Choices (select all choices that are correct)
What are three possible entry points (pathways) that could be used for launching a cyber attack?
Available Choices (select all choices that are correct)
What is the primary audience for Part 2-5 of the ISA/IEC 62443 Series - Policies & Procedures group of standards?
Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?
Available Choices (select all choices that are correct)
Which is a reason for
and physical security regulations meeting a mixed resistance?
Available Choices (select all choices that are correct)
Which layer in the Open Systems Interconnection (OSI) model would include the use of the File Transfer Protocol (FTP)?
Available Choices (select all choices that are correct)