Which of the following ISA-99 (IEC 62443) Reference Model levels is named correctly?
Available Choices (select all choices that are correct)
Which part of the standard provides a list of possible Foundational Requirements to address assessed risks?
Why were PLCs originally designed?
Which of the following tools has the potential for serious disruption of a control network and should not be used on a live system?
Available Choices (select all choices that are correct)
What is TRUE regarding safety systems?
What type of cyberattack was discussed in the Ukrainian power grid case study?
Which is a reason for
and physical security regulations meeting a mixed resistance?
Available Choices (select all choices that are correct)
Which of the following protocols is mentioned as being commonly used in control systems?
Which of the following PRIMARILY determines access privileges for user accounts?
Available Choices (select all choices that are correct)
What are three possible entry points (pathways) that could be used for launching a cyber attack?
Available Choices (select all choices that are correct)
Which factor drives the selection of countermeasures?
Available Choices (select all choices that are correct)
In what step of the development process of the CSMS is “Establish purpose, organizational support, resources, and scope” taken care of?
Which layer deals with data format conversion and encryption?
Which protocol is commonly used for managing the security of message transmission on the Internet via web browsers?
Which of the following is a cause for the increase in attacks on IACS?
Available Choices (select all choices that are correct)
What is defined as the hardware and software components of an IACS?
Available Choices (select all choices that are correct)
Which of the following provides the overall conceptual basis in the design of an appropriate security program?
Which communications system covers a large geographic area?
Available Choices (select all choices that are correct)
What type of security level defines what a component or system is capable of meeting?
Available Choices (select all choices that are correct)
What is a key activity in the Maintain phase?
Which of the following is an example of a device used for intrusion detection?
Which steps are part of implementing countermeasures?
Available Choices (select all choices that are correct)
Why is it important to document the results of the initial/high-level risk assessment?
Which organization manages the ISASecure conformance certification program?
Available Choices (select all choices that are correct)
Which part of the ISA/IEC 62443 series describes a methodology to develop quantitative metrics?
Which of the following is a recommended default rule for IACS firewalls?
Available Choices (select all choices that are correct)
What type of malware disrupted an emergency shutdown capability in safety systems?
How many maturity levels (ML) are established for evaluation criteria according to ISA/IEC 62443-2-4?
Safety management staff are stakeholders of what security program development?
Available Choices (select all choices that are correct)
What is a key aspect of the relationship between physical security measures and cybersecurity?
Which of the following is the underlying protocol for Ethernet/IP?
Available Choices (select all choices that are correct)
Which of the following starts at a high level and includes all ANSI/ISA-95 Level 0,1,2,3,4 equipment and information systems?
Which layer is responsible for error checking and MAC addressing?
Which characteristic is MOST closely associated with the deployment of a demilitarized zone (DMZ)?
Available Choices (select all choices that are correct)
What are the three main components of the ISASecure Integrated Threat Analysis (ITA) Program?
Available Choices (select all choices that are correct)
Which is a role of the application layer?
Available Choices (select all choices that are correct)
How should CSMS organizational responsibilities or training be handled over time?
Which of the following is an activity that should trigger a review of the CSMS?
Available Choices (select all choices that are correct)
What is a frequent mistake made with cybersecurity management?
Which is the PRIMARY objective when defining a security zone?
Available Choices (select all choices that are correct)
What is the primary goal of the Assess phase in the IACS Cybersecurity Lifecycle?
What does ISASecure primarily focus on?
Which steps are included in the ISA/IEC 62443 assess phase?
Available Choices (select all choices that are correct)
Which of the following refers to internal rules that govern how an organization protects critical system resources?
Available Choices (select all choices that are correct)
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)