Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

ISA ISA-IEC-62443 ISA/IEC 62443 Cybersecurity Fundamentals Specialist Exam Practice Test

Demo: 45 questions
Total 151 questions

ISA/IEC 62443 Cybersecurity Fundamentals Specialist Questions and Answers

Question 1

Which of the following ISA-99 (IEC 62443) Reference Model levels is named correctly?

Available Choices (select all choices that are correct)

Options:

A.

Level 1: Supervisory Control

B.

Level 2: Quality Control

C.

Level 3: Operations Management

D.

Level 4: Process

Question 2

Which part of the standard provides a list of possible Foundational Requirements to address assessed risks?

Options:

A.

ISA/IEC 62443-3-1

B.

ISA/IEC 62443-3-2

C.

ISA/IEC 62443-3-3

D.

ISA/IEC 62443-3-4

Question 3

Why were PLCs originally designed?

Options:

A.

To replace relays

B.

To service I/O exclusively

C.

To enhance network security

D.

To improve Ethernet functionality

Question 4

Which of the following tools has the potential for serious disruption of a control network and should not be used on a live system?

Available Choices (select all choices that are correct)

Options:

A.

Remote desktop

B.

Vulnerability scanner

C.

FTP

D.

Web browser

Question 5

What is TRUE regarding safety systems?

Options:

A.

No dedicated malware has been found targeting safety systems specifically.

B.

Even the most modern and sophisticated safety systems can be defeated by an attacker.

C.

Safety systems are an independent protection layer and as such have no cybersecurity vulnerabilities.

D.

By integrating control and safety systems via Modbus TCP, cybersecurity risks are at a tolerable level.

Question 6

What type of cyberattack was discussed in the Ukrainian power grid case study?

Options:

A.

Internal sabotage

B.

Nation state

C.

Insider threat

D.

Random hacking

Question 7

Which is a reason for

and physical security regulations meeting a mixed resistance?

Available Choices (select all choices that are correct)

Options:

A.

Regulations are voluntary documents.

B.

Regulations contain only informative elements.

C.

Cybersecurity risks can best be managed individually and in isolation.

D.

There are a limited number of enforced cybersecurity and physical security regulations.

Question 8

Which of the following protocols is mentioned as being commonly used in control systems?

Options:

A.

FTP

B.

HTTP

C.

SMTP

D.

Modbus TCP

Question 9

Which of the following PRIMARILY determines access privileges for user accounts?

Available Choices (select all choices that are correct)

Options:

A.

Users' desire for ease of use

B.

Authorization security policy

C.

Common practice

D.

Technical capability

Question 10

What are three possible entry points (pathways) that could be used for launching a cyber attack?

Available Choices (select all choices that are correct)

Options:

A.

LAN, portable media, and wireless

B.

LAN, portable media, and hard drives

C.

LAN, power source, and wireless OD.

D.

LAN, WAN, and hard drive

Question 11

Which factor drives the selection of countermeasures?

Available Choices (select all choices that are correct)

Options:

A.

Foundational requirements

B.

Output from a risk assessment

C.

Security levels

D.

System design

Question 12

In what step of the development process of the CSMS is “Establish purpose, organizational support, resources, and scope” taken care of?

Options:

A.

Initiate the CSMS program.

B.

Conduct an initial/high-level risk assessment.

C.

Create reference architecture.

D.

Establish policy, organization, and awareness.

Question 13

Which layer deals with data format conversion and encryption?

Options:

A.

Session

B.

Data link

C.

Application

D.

Presentation

Question 14

Which protocol is commonly used for managing the security of message transmission on the Internet via web browsers?

Options:

A.

TLS

B.

L2TP

C.

PPTP

D.

IPsec

Question 15

Which of the following is a cause for the increase in attacks on IACS?

Available Choices (select all choices that are correct)

Options:

A.

Use of proprietary communications protocols

B.

The move away from commercial off the shelf (COTS) systems, protocols, and networks

C.

Knowledge of exploits and tools readily available on the Internet

D.

Fewer personnel with system knowledge having access to IACS

Question 16

What is defined as the hardware and software components of an IACS?

Available Choices (select all choices that are correct)

Options:

A.

COTS software and hardware

B.

Electronic security

C.

Control system

D.

Cybersecuritv

Question 17

Which of the following provides the overall conceptual basis in the design of an appropriate security program?

Options:

A.

Asset model

B.

Zone model

C.

Reference model

D.

Reference architecture

Question 18

Which communications system covers a large geographic area?

Available Choices (select all choices that are correct)

Options:

A.

Campus Area Network (CAN)

B.

Local Area Network (LAN)

C.

Storage Area Network

D.

Wide Area Network (WAN)

Question 19

What type of security level defines what a component or system is capable of meeting?

Available Choices (select all choices that are correct)

Options:

A.

Capability security level

B.

Achieved security level

C.

Design security level

D.

Target security level

Question 20

What is a key activity in the Maintain phase?

Options:

A.

Risk assessment

B.

Managing changes

C.

Allocating assets to security zones

D.

Designing cybersecurity countermeasures

Question 21

Which of the following is an example of a device used for intrusion detection?

Options:

A.

Router

B.

Switch

C.

Firewall

D.

Host-based IDS

Question 22

Which steps are part of implementing countermeasures?

Available Choices (select all choices that are correct)

Options:

A.

Establish the risk tolerance and select common countermeasures.

B.

Establish the risk tolerance and update the business continuity plan.

C.

Select common countermeasures and update the business continuity plan.

D.

Select common countermeasures and collaborate with stakeholders.

Question 23

Why is it important to document the results of the initial/high-level risk assessment?

Options:

A.

To establish a baseline

B.

To reduce communication

C.

To skip future assessments

D.

To avoid stakeholder involvement

Question 24

Which organization manages the ISASecure conformance certification program?

Available Choices (select all choices that are correct)

Options:

A.

American Society for Industrial Security

B.

Automation Federation

C.

National Institute of Standards and Technology

D.

Security Compliance Institute

Question 25

Which part of the ISA/IEC 62443 series describes a methodology to develop quantitative metrics?

Options:

A.

Part 1-2

B.

Part 1-3

C.

Part 2-1

D.

Part 3-2

Question 26

Which of the following is a recommended default rule for IACS firewalls?

Available Choices (select all choices that are correct)

Options:

A.

Allow all traffic by default.

B.

Allow IACS devices to access the Internet.

C.

Allow traffic directly from the IACS network to the enterprise network.

D.

Block all traffic by default.

Question 27

What type of malware disrupted an emergency shutdown capability in safety systems?

Options:

A.

Zeus

B.

Stuxnet

C.

WannaCry

D.

Triton or Trisis

Question 28

How many maturity levels (ML) are established for evaluation criteria according to ISA/IEC 62443-2-4?

Options:

A.

2

B.

3

C.

4

D.

5

Question 29

Safety management staff are stakeholders of what security program development?

Available Choices (select all choices that are correct)

Options:

A.

CSMS

B.

SPRP

C.

CSA

D.

ERM

Question 30

What is a key aspect of the relationship between physical security measures and cybersecurity?

Options:

A.

Cybersecurity is irrelevant.

B.

Physical security is more important.

C.

They should operate independently.

D.

They should complement each other.

Question 31

Which of the following is the underlying protocol for Ethernet/IP?

Available Choices (select all choices that are correct)

Options:

A.

Building Automation and Control Network (BACnet)

B.

Common Industrial Protocol

C.

Highway Addressable Remote Transducer (HART)

D.

Object Linking and Embedding (OLE) for Process Control

Question 32

Which of the following starts at a high level and includes all ANSI/ISA-95 Level 0,1,2,3,4 equipment and information systems?

Options:

A.

Zone model

B.

Asset model

C.

Reference model

D.

Reference architecture

Question 33

Which layer is responsible for error checking and MAC addressing?

Options:

A.

Network

B.

Transport

C.

Application

D.

Data link

Question 34

Which characteristic is MOST closely associated with the deployment of a demilitarized zone (DMZ)?

Available Choices (select all choices that are correct)

Options:

A.

Level 4 systems must use the DMZ to communicate with Level 3 and below.

B.

Level 0 can only interact with Level 1 through the firewall.

C.

Internet access through the firewall is allowed.

D.

Email is prevented, thereby mitigating the risk of phishing attempts.

Question 35

What are the three main components of the ISASecure Integrated Threat Analysis (ITA) Program?

Available Choices (select all choices that are correct)

Options:

A.

Software development security assurance, functional security assessment, and communications robustness testing

B.

Software robustness security testing, functional software assessment assurance, and essential security functionality assessment

C.

Communications robustness testing, functional security assurance, and software robustness communications

D.

Communication speed, disaster recovery, and essential security functionality assessment

Question 36

Which is a role of the application layer?

Available Choices (select all choices that are correct)

Options:

A.

Includes protocols specific to network applications such as email, file transfer, and reading data registers in a PLC

B.

Includes user applications specific to network applications such as email, file transfer, and reading data registers in a PLC

C.

Provides the mechanism for opening, closing, and managing a session between end-user application processes

D.

Delivers and formats information, possibly with encryption and security

Question 37

How should CSMS organizational responsibilities or training be handled over time?

Options:

A.

They should be ignored.

B.

They should be evaluated.

C.

They should remain constant.

D.

They should be expanded indefinitely.

Question 38

Which of the following is an activity that should trigger a review of the CSMS?

Available Choices (select all choices that are correct)

Options:

A.

Budgeting

B.

New technical controls

C.

Organizational restructuring

D.

Security incident exposing previously unknown risk.

Question 39

What is a frequent mistake made with cybersecurity management?

Options:

A.

Ignoring organizational culture

B.

Focusing solely on technology solutions

C.

Implementing too many security practices at once

D.

Initially addressing smaller pieces of the entire system

Question 40

Which is the PRIMARY objective when defining a security zone?

Available Choices (select all choices that are correct)

Options:

A.

All assets in the zone must be from the same vendor.

B.

All assets in the zone must share the same security requirements.

C.

All assets in the zone must be at the same level in the Purdue model.

D.

All assets in the zone must be physically located in the same area.

Question 41

What is the primary goal of the Assess phase in the IACS Cybersecurity Lifecycle?

Options:

A.

To conduct periodic audits

B.

To implement countermeasures

C.

To assign a Target Security Level (SL-T)

D.

To ensure the Achieved Security Level (SL-A) meets the Target Security Level (SL-T)

Question 42

What does ISASecure primarily focus on?

Options:

A.

Developing internal testing labs

B.

Certifying IACS products and systems for cybersecurity

C.

Offering assessments for integrator site engineering practices

D.

Managing asset owner operations and maintenance practices

Question 43

Which steps are included in the ISA/IEC 62443 assess phase?

Available Choices (select all choices that are correct)

Options:

A.

Cybersecurity requirements specification and detailed cyber risk assessment

B.

Cybersecurity requirements specification and allocation of IACS assets to zones and conduits

C.

Detailed cyber risk assessment and cybersecurity maintenance, monitoring, and management of change

D.

Allocation of IACS assets to zones and conduits, and detailed cyber risk assessment

Question 44

Which of the following refers to internal rules that govern how an organization protects critical system resources?

Available Choices (select all choices that are correct)

Options:

A.

Formal guidance

B.

Legislation

C.

Security policy

D- Code of conduct

Question 45

Which of the following attacks relies on a human weakness to succeed?

Available Choices (select all choices that are correct)

Options:

A.

Denial-of-service

B.

Phishing

C.

Escalation-of-privileges

D.

Spoofing

Demo: 45 questions
Total 151 questions