What is the primary goal of the Assess phase in the IACS Cybersecurity Lifecycle?
What is the primary audience for Part 2-5 of the ISA/IEC 62443 Series - Policies & Procedures group of standards?
What is a key aspect of the relationship between physical security measures and cybersecurity?
Which activity is part of establishing policy, organization, and awareness?
Available Choices (select all choices that are correct)
Which statement BEST describes the enforceability of standards?
What is the formula for calculating risk?
Which is a commonly used protocol for managing secure data transmission on the Internet?
Available Choices (select all choices that are correct)
Which standard is recognized as part of the NIST CSF Informative References?
If an asset owner wants to demonstrate compliance with ISA/IEC 62443-2-1 requirements during an external audit, which type of evidence would be MOST appropriate?
A manufacturing plant has inconsistent cybersecurity processes that vary widely between shifts and teams. According to the maturity levels described in ISA/IEC 62443-2-1, how would this situation be classified?
Which statement BEST describes the Target Security Protection Ratings?
What is the primary purpose of the NIST Cybersecurity Framework (CSF)?
Which communications system covers a large geographic area?
Available Choices (select all choices that are correct)
What are the connections between security zones called?
Available Choices (select all choices that are correct)
Within the National Institute of Standards and Technoloqv Cybersecuritv Framework v1.0 (NIST CSF), what is the status of the ISA 62443 standards?
Available Choices (select all choices that are correct)
What is the primary purpose of the NIST Cybersecurity Framework (CSF)?
If an asset owner wants to improve their organization’s ability to respond during a cyberattack, which of the following activities would be MOST appropriate to implement?
At Layer 4 of the Open Systems Interconnection (OSI) model, what identifies the application that will handle a packet inside a host?
Available Choices (select all choices that are correct)
Which is an important difference between IT systems and IACS?
What must be established as part of the risk assessment process?
After receiving an approved patch from the JACS vendor, what is BEST practice for the asset owner to follow?
Multiuser accounts and shared passwords inherently carry which of the followinq risks?
Available Choices (select all choices that are correct)
Safety management staff are stakeholders of what security program development?
Available Choices (select all choices that are correct)
Which of the following is NOT listed under Organizational Security Measures (SP Element 1)?
Which Security Level (SL) would be MOST appropriate for a system that requires protection against attackers with high motivation and extended resources using sophisticated means?
What is one challenge associated with firewalls?
A plant has several zones including business, safety-critical, and wireless zones. According to ISA/IEC 62443, how should these zones be managed during risk assessment?
As related to IACS Maintenance Service Providers, when do maintenance activities generally start?
Which of the following is an element of security policy, organization, and awareness?
Available Choices (select all choices that are correct)
What impact do increasing cybercrime attacks have?
Electronic security, as defined in ANSI/ISA-99.00.01:2007. includes which of the following?
Available Choices (select all choices that are correct)
Which standard is applied during the Assess phase for risk assessment?
Which statement is TRUE reqardinq application of patches in an IACS environment?
Available Choices (select all choices that are correct)
Which of the following technologies is no longer considered secure?
In a defense-in-depth strategy, what is the purpose of role-based access control?
Available Choices (select all choices that are correct)
Which of the following staff is NOT mentioned as a stakeholder in the CSMS Program?
Which model describes relationships between assets within an industrial automation and control system?
What type of cyberattack was discussed in the Ukrainian power grid case study?
A company manufactures embedded devices and network components used in control systems but does not participate in on-site installation or maintenance. What role do they fulfill?
What type of malware disrupted an emergency shutdown capability in safety systems?
Which type of cryptographic algorithms requires more than one key?
Available Choices (select all choices that are correct)
What does IACS stand for?
What is recommended to use between the plant floor and the rest of the company networks?
What are the two sublayers of Layer 2?
Available Choices (select all choices that are correct)
Security Levels (SLs) are broken down into which three types?
What is the FIRST step required in implementing ISO 27001?
Available Choices (select all choices that are correct)
Which is a common pitfall when initiating a CSMS program?
Available Choices (select all choices that are correct)
In what step of the development process of the CSMS is “Establish purpose, organizational support, resources, and scope” taken care of?
Which of the following is an activity that should trigger a review of the CSMS?
Available Choices (select all choices that are correct)
How many maturity levels (ML) are established for evaluation criteria according to ISA/IEC 62443-2-4?
According to the scheme for cybersecurity profiles, which of the following is true about ISA/IEC 62443 security requirements when creating a security profile?
To which category of the ISA-62443 (IEC 62443) series does the document titled "Patch management in the IACS environment" belong?
What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?
Available Choices (select all choices that are correct)
A company needs to create a standardized interface for exchanging real-time plant data between heterogeneous control devices while maintaining a structured organization of data elements such as folders, classes, and methods. Which feature of OPC supports this requirement?
Which of the following BEST describes a control system?
After receiving an approved patch from the IACS vendor, what is BEST practice for the asset owner to follow?
Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?
Available Choices (select all choices that are correct)
Which of the following is NOT a general class of firewalls?
Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?
Which service does an Intrusion Detection System (IDS) provide?
Available Choices (select all choices that are correct)
What makes patching in IACS environments particularly complex?
A multinational corporation needs to implement a cybersecurity framework that can be adapted across different countries and industries while allowing continuous improvement. Which feature of the NIST CSF makes it suitable for this purpose?
What does the expression SL-T (BPCS Zone) vector {2 2 0 1 3 1 3} represent?
An industrial facility wants to ensure that only authorized communication reaches its PLCs while minimizing disruption to time-sensitive control processes. Which type of firewall would BEST suit this need?
An industrial control system requires strong protection against intentional violations using sophisticated means and moderate skills. According to the Security Level (SL) definitions, which SL should be targeted?
Which of the following protocols is mentioned as being commonly used in control systems?
Which statement is TRUE regarding Intrusion Detection Systems (IDS)?
Available Choices (select all choices that are correct)
Which of the following is NOT a general class of firewalls?