Why is patch management more difficult for IACS than for business systems?
Available Choices (select all choices that are correct)
Which analysis method is MOST frequently used as an input to a security risk assessment?
Available Choices (select all choices that are correct)
Which of the following is the BEST example of detection-in-depth best practices?
Available Choices (select all choices that are correct)
Within the National Institute of Standards and Technoloqv Cybersecuritv Framework v1.0 (NIST CSF), what is the status of the ISA 62443 standards?
Available Choices (select all choices that are correct)
Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?
Available Choices (select all choices that are correct)
Which of the following staff is NOT mentioned as a stakeholder in the CSMS Program?
Which model describes relationships between assets within an industrial automation and control system?
Which of the ISA 62443 standards focuses on the process of developing secure products?
Available Choices (select all choices that are correct)
Which part of the ISA/IEC 62443 series describes a methodology to develop quantitative metrics?
Which is a role of the application layer?
Available Choices (select all choices that are correct)
Which activity is part of establishing policy, organization, and awareness?
Available Choices (select all choices that are correct)
Which steps are included in the ISA/IEC 62443 assess phase?
Available Choices (select all choices that are correct)
Why is OPC Classic considered firewall unfriendly?
Available Choices (select all choices that are correct)
What is a key aspect of the relationship between physical security measures and cybersecurity?
What does Foundational Requirement 6 (FR 6) - Timely Response to Events (TRE) require?
What is one of the primary causes of cyber-related production losses in process control systems?
Authorization (user accounts) must be granted based on which of the following?
Available Choices (select all choices that are correct)
Which service does an Intrusion Detection System (IDS) provide?
Available Choices (select all choices that are correct)
What is the purpose of ISO/IEC 15408 (Common Criteria)?
Available Choices (select all choices that are correct)
Which statement is TRUE reqardinq application of patches in an IACS environment?
Available Choices (select all choices that are correct)
According to ISA/IEC TR 62443-1-5, which documents can be referenced when creating a security profile?
During the operation of an IACS, who is responsible for executing the Security Protection Scheme (SPS) process measures and responding to emerging risks?
What is defined as the hardware and software components of an IACS?
Available Choices (select all choices that are correct)
Which policies and procedures publication is titled Patch Manaqement in the IACS Environment?
Available Choices (select all choices that are correct)
The Risk Analysis category contains background information that is used where?
Available Choices (select all choices that are correct)
If an industrial control system experiences frequent unexpected shutdowns causing downtime, which SP Element activities should be reviewed to improve system availability?
The ISA/IEC 62443 Profiles Group will include parts starting with which number?
Which statement is TRUE regarding Intrusion Detection Systems (IDS)?
Available Choices (select all choices that are correct)
Which of the following is a trend that has caused a significant percentage of security vulnerabilities?
Available Choices (select all choices that are correct)
According to the scheme for cybersecurity profiles, which of the following is true about ISA/IEC 62443 security requirements when creating a security profile?
Which is the BEST deployment system for malicious code protection?
Available Choices (select all choices that are correct)
Which of the following PRIMARILY determines access privileges for user accounts?
Available Choices (select all choices that are correct)
How does ISA/IEC 62443-2-1 suggest integrating the IACS Security Program (SP) within an organization?
Which part of the standard provides a list of possible Foundational Requirements to address assessed risks?
An industrial facility wants to ensure that only authorized communication reaches its PLCs while minimizing disruption to time-sensitive control processes. Which type of firewall would BEST suit this need?
What is the definition of " defense in depth " when referring to cybersecurity?
Which Security Level (SL) would be MOST appropriate for a system that requires protection against attackers with high motivation and extended resources using sophisticated means?
What does the abbreviation CSMS round in ISA 62443-2-1 represent?
Available Choices (select all choices that are correct)
What programs are MOST effective if they are tailored to the audience, consistent with company policy, and communicated regularly?
If a system integrator is designing zones and conduits for an IACS network based on risk assessments, which part of the ISA/IEC 62443 standard guides this process?
Under User Access Control (SP Element 6), which of the following is included in USER 1 — Identification and Authentication?
An industrial facility wants to ensure that only authorized systems reach its PLCs while minimizing disruption to time-sensitive control processes. Which type of firewall would BEST suit this need?
A manufacturing plant has inconsistent cybersecurity processes that vary widely between shifts and teams. According to the maturity levels described in ISA/IEC 62443-2-1, how would this situation be classified?
Which is NOT a potential consequence for organizations that fail to prioritize control system security?
A national standards body wants to represent its country’s interests at an international level and adopt global standards locally. What role does this organization fulfill?
Using the risk matrix below, what is the risk of a medium likelihood event with high consequence?
ISA/IEC 62443 - Part 4-2 covers technical security requirements for which types of IACS components?
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
Which is a commonly used protocol for managing secure data transmission on the Internet?
Available Choices (select all choices that are correct)
Which organization manages the ISASecure conformance certification program?
Available Choices (select all choices that are correct)
Why is it important to document the results of the initial/high-level risk assessment?