What is a requirement for product security development lifecycles?
Which service does an Intrusion Detection System (IDS) provide?
What is the FIRST step required in implementing ISO 27001?
Available Choices (select all choices that are correct)
In an IACS system, a typical security conduit consists of which of the following assets?
An industrial facility wants to ensure that only authorized communication reaches its PLCs while minimizing disruption to time-sensitive control processes. Which type of firewall would BEST suit this need?
Which of the following is NOT listed as a potential consequence of compromising IACS according to the ISA99 Committee scope?
Multiuser accounts and shared passwords inherently carry which of the followinq risks?
Available Choices (select all choices that are correct)
How many maturity levels (ML) are established for evaluation criteria according to ISA/IEC 62443-2-4?
A company manufactures embedded devices and network components used in control systems but does not participate in on-site installation or maintenance. What role do they fulfill?
Which is the BEST practice when establishing security zones?
Available Choices (select all choices that are correct)
Why is it important for the asset owner to incorporate the IACS into its organization and security program during the Operation and Maintenance phase?
Which statement BEST describes the Target Security Protection Ratings?
To which category of the ISA-62443 (IEC 62443) series does the document titled "Patch management in the IACS environment" belong?
How many element groups are in the "Addressing Risk" CSMS category?
Available Choices (select all choices that are correct)
Which of the following is NOT a general class of firewalls?
Security Levels (SLs) are broken down into which three types?
How many element groups are in the "Addressing Risk" CSMS category?
What are three possible entry points (pathways) that could be used for launching a cyber attack?
Available Choices (select all choices that are correct)
A manufacturing plant has inconsistent cybersecurity processes that vary widely between shifts and teams. According to the maturity levels described in ISA/IEC 62443-2-1, how would this situation be classified?
What programs are MOST effective if they are tailored to the audience, consistent with company policy, and communicated regularly?
Which is the PRIMARY objective when defining a security zone?
Available Choices (select all choices that are correct)
Which of the following BEST describes a control system?
According to ISA/IEC TR 62443-1-5, which documents can be referenced when creating a security profile?
Which term refers to legally enforceable rules created by government bodies or authorized organizations?
Which standard is recognized as part of the NIST CSF Informative References?
As related to IACS Maintenance Service Providers, when do maintenance activities generally start?
Which is an important difference between IT systems and IACS?
Available Choices (select all choices that are correct)
Which layer deals with data format conversion and encryption?
Whose responsibility is it to determine the level of risk an organization is willing to tolerate?
Available Choices (select all choices that are correct)
Which of the following is an activity that should trigger a review of the CSMS?
Available Choices (select all choices that are correct)
Which Security Level (SL) would be MOST appropriate for a system that requires protection against attackers with high motivation and extended resources using sophisticated means?
What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?
Available Choices (select all choices that are correct)
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
ISA/IEC 62443 – Part 4-2 covers technical security requirements for which types of IACS components?
Which is NOT a potential consequence for organizations that fail to prioritize control system security?
Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?
Available Choices (select all choices that are correct)
Which model describes relationships between assets within an industrial automation and control system?
What does Part 6-1 of the ISA/IEC 62443 series specify?
As related to technical security requirements for IACS components, what does CCSC stand for?
What is one challenge associated with firewalls?
What is a feature of an asymmetric key?
Available Choices (select all choices that are correct)
Which is a PRIMARY reason why network security is important in IACS environments?
Available Choices (select all choices that are correct)
Which ISA/IEC 62443 part covers technical security requirements used by product suppliers, integration service providers, and asset owners?
How should CSMS organizational responsibilities or training be handled over time?
If a U.S. federal agency must comply with mandatory cybersecurity requirements under law, which document would they be required to follow?
Which layer is responsible for error checking and MAC addressing?
What is the primary purpose of the NIST Cybersecurity Framework (CSF)?
What.are the two elements of the risk analysis category of an IACS?
Available Choices (select all choices that are correct)
Which of the following is NOT a strategy for deploying a WAN?
Why is it important to document the results of the initial/high-level risk assessment?
How does ISA/IEC 62443-2-1 suggest integrating the IACS Security Program (SP) within an organization?
What does the expression SL-T (BPCS Zone) vector {2 2 0 1 3 1 3} represent?
An industrial control system requires strong protection against intentional violations using sophisticated means and moderate skills. According to the Security Level (SL) definitions, which SL should be targeted?
Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?
Available Choices (select all choices that are correct)
Within the National Institute of Standards and Technoloqv Cybersecuritv Framework v1.0 (NIST CSF), what is the status of the ISA 62443 standards?
Available Choices (select all choices that are correct)
What does ISASecure primarily focus on?
Which of the following activities is NOT listed under the “Patch Testing” phase in the asset owner requirements?
What are the two sublayers of Layer 2?
Available Choices (select all choices that are correct)
Who must be included in a training and security awareness program?
Available Choices (select all choices that are correct)
What are the two elements of the risk analysis category of an IACS?
Which of the following is the BEST reason for periodic audits?
Available Choices (select all choices that are correct)
Which of the following is a recommended default rule for IACS firewalls?
Available Choices (select all choices that are correct)
What is a key activity in the Maintain phase?
Using the risk matrix below, what is the risk of a medium likelihood event with high consequence?
A company discovers malware on a portable USB device used within their IACS environment. According to the document, which SP Element and controls would be MOST relevant to address this issue?
Which part of the standard provides a list of possible Foundational Requirements to address assessed risks?
What caution is advised when using the vector approach to security levels?
Which is a common pitfall when initiating a CSMS program?
Available Choices (select all choices that are correct)