Which steps are included in the ISA/IEC 62443 assess phase?
Available Choices (select all choices that are correct)
Which of the following is the underlying protocol for Ethernet/IP?
Available Choices (select all choices that are correct)
Which analysis method is MOST frequently used as an input to a security risk assessment?
Available Choices (select all choices that are correct)
What is a key aspect of the relationship between physical security measures and cybersecurity?
What does Foundational Requirement 6 (FR 6) - Timely Response to Events (TRE) require?
What type of attack is characterized by encrypting an organization’s data and demanding payment for restoration?
Which of the following is the BEST example of detection-in-depth best practices?
Available Choices (select all choices that are correct)
Which is a reason for
and physical security regulations meeting a mixed resistance?
Available Choices (select all choices that are correct)
Which of the following can be employed as a barrier device in a segmented network?
Available Choices (select all choices that are correct)
In a defense-in-depth strategy, what is the purpose of role-based access control?
Available Choices (select all choices that are correct)
Which characteristic is MOST closely associated with the deployment of a demilitarized zone (DMZ)?
Available Choices (select all choices that are correct)
Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?
Available Choices (select all choices that are correct)
To which category of the ISA-62443 (IEC 62443) series does the document titled “Patch management in the IACS environment” belong?
Which is the PRIMARY reason why Modbus over Ethernet is easy to manaqe in a firewall?
Available Choices (select all choices that are correct)
Why is it important to document the results of the initial/high-level risk assessment?
Which of the following provides the overall conceptual basis in the design of an appropriate security program?
Available Choices (select all choices that are correct)
Which analysis method is MOST frequently used as an input to a security risk assessment?
Available Choices (select all choices that are correct)
As related to IACS Maintenance Service Providers, when do maintenance activities generally start?
Which of the ISA 62443 standards focuses on the process of developing secure products?
Available Choices (select all choices that are correct)
What does the abbreviation CSMS round in ISA 62443-2-1 represent?
Available Choices (select all choices that are correct)
Which is a commonly used protocol for managing secure data transmission on the Internet?
Available Choices (select all choices that are correct)
Which is a role of the application layer?
Available Choices (select all choices that are correct)
Which of the following ISA-99 (IEC 62443) Reference Model levels is named correctly?
Available Choices (select all choices that are correct)
What is recommended to use between the plant floor and the rest of the company networks?
Which of the following is a recommended default rule for IACS firewalls?
Available Choices (select all choices that are correct)
Which is the BEST practice when establishing security zones?
Available Choices (select all choices that are correct)
What is one of the primary causes of cyber-related production losses in process control systems?
Which factor drives the selection of countermeasures?
Available Choices (select all choices that are correct)
Which protocol is commonly used for managing the security of message transmission on the Internet via web browsers?
Security Levels (SLs) are broken down into which three types?
Available Choices (select all choices that are correct)
Which layer specifies the rules for Modbus Application Protocol
Available Choices (select all choices that are correct)
How many maturity levels (ML) are established for evaluation criteria according to ISA/IEC 62443-2-4?