What is recommended to use between the plant floor and the rest of the company networks?
Which protocol is commonly used for managing the security of message transmission on the Internet via web browsers?
Which is a role of the application layer?
Available Choices (select all choices that are correct)
How many security levels are in the ISASecure certification program?
Available Choices (select all choices that are correct)
Which of the following is a recommended default rule for IACS firewalls?
Available Choices (select all choices that are correct)
Which is the PRIMARY reason why Modbus over Ethernet is easy to manaqe in a firewall?
Available Choices (select all choices that are correct)
What is the purpose of ISO/IEC 15408 (Common Criteria)?
Available Choices (select all choices that are correct)
Which statement is TRUE reqardinq application of patches in an IACS environment?
Available Choices (select all choices that are correct)
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
Which of the following refers to internal rules that govern how an organization protects critical system resources?
Available Choices (select all choices that are correct)
In a defense-in-depth strategy, what is the purpose of role-based access control?
Available Choices (select all choices that are correct)
Electronic security, as defined in ANSI/ISA-99.00.01:2007. includes which of the following?
Available Choices (select all choices that are correct)
Which of the following tools has the potential for serious disruption of a control network and should not be used on a live system?
Available Choices (select all choices that are correct)
Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?
Available Choices (select all choices that are correct)
Which of the following is the BEST reason for periodic audits?
Available Choices (select all choices that are correct)
Which of the following is an industry sector-specific standard?
Available Choices (select all choices that are correct)
Which is a PRIMARY reason why network security is important in IACS environments?
Available Choices (select all choices that are correct)
What is Modbus?
What is the definition of "defense in depth" when referring to
Available Choices (select all choices that are correct)
Which layer specifies the rules for Modbus Application Protocol
Available Choices (select all choices that are correct)
Safety management staff are stakeholders of what security program development?
Available Choices (select all choices that are correct)
What is the purpose of ICS-CERT Alerts?
Which organization is responsible for the ISA 62443 series of standards?
Which of the following BEST describes ‘Vulnerability’?
Which type of cryptographic algorithms requires more than one key?
Available Choices (select all choices that are correct)
Which steps are part of implementing countermeasures?
Available Choices (select all choices that are correct)
Which is a commonly used protocol for managing secure data transmission on the Internet?
Available Choices (select all choices that are correct)
Why is patch management more difficult for IACS than for business systems?
Available Choices (select all choices that are correct)
Which of the following is a cause for the increase in attacks on IACS?
Available Choices (select all choices that are correct)
Which is the implementation of PROFIBUS over Ethernet for non-safety-related communications?
Available Choices (select all choices that are correct)
How can Modbus be secured?
Which part of the standard provides a list of possible Foundational Requirements to address assessed risks?
What does ISASecure primarily focus on?
Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?
Available Choices (select all choices that are correct)
Which of the following provides the overall conceptual basis in the design of an appropriate security program?
Available Choices (select all choices that are correct)
The Risk Analysis category contains background information that is used where?
Available Choices (select all choices that are correct)
What is one challenge associated with firewalls?
What is the name of the protocol that implements serial Modbus over Ethernet?
Available Choices (select all choices that are correct)
What is the primary purpose of the NIST Cybersecurity Framework (CSF)?
Which is NOT a potential consequence for organizations that fail to prioritize control system security?
What are the three main components of the ISASecure Integrated Threat Analysis (ITA) Program?
Available Choices (select all choices that are correct)
Which organization manages the ISASecure conformance certification program?
Available Choices (select all choices that are correct)
Within the National Institute of Standards and Technoloqv Cybersecuritv Framework v1.0 (NIST CSF), what is the status of the ISA 62443 standards?
Available Choices (select all choices that are correct)
To which category of the ISA-62443 (IEC 62443) series does the document titled “Patch management in the IACS environment” belong?
Which of the following staff is NOT mentioned as a stakeholder in the CSMS Program?