Which of the following is an industry sector-specific standard?
Available Choices (select all choices that are correct)
What.are the two elements of the risk analysis category of an IACS?
Available Choices (select all choices that are correct)
Which is a PRIMARY reason why network security is important in IACS environments?
Available Choices (select all choices that are correct)
Which layer in the Open Systems Interconnection (OSI) model would include the use of the File Transfer Protocol (FTP)?
Available Choices (select all choices that are correct)
What does the abbreviation CSMS round in ISA 62443-2-1 represent?
Available Choices (select all choices that are correct)
Which is the implementation of PROFIBUS over Ethernet for non-safety-related communications?
Available Choices (select all choices that are correct)
Which organization manages the ISASecure conformance certification program?
Available Choices (select all choices that are correct)
Within the National Institute of Standards and Technoloqv Cybersecuritv Framework v1.0 (NIST CSF), what is the status of the ISA 62443 standards?
Available Choices (select all choices that are correct)
Which is the BEST practice when establishing security zones?
Available Choices (select all choices that are correct)
Security Levels (SLs) are broken down into which three types?
Available Choices (select all choices that are correct)
Which statement is TRUE reqardinq application of patches in an IACS environment?
Available Choices (select all choices that are correct)
Which is a reason for
and physical security regulations meeting a mixed resistance?
Available Choices (select all choices that are correct)
Which of the following PRIMARILY determines access privileges for user accounts?
Available Choices (select all choices that are correct)
After receiving an approved patch from the JACS vendor, what is BEST practice for the asset owner to follow?
Which is the BEST deployment system for malicious code protection?
Available Choices (select all choices that are correct)
What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?
Available Choices (select all choices that are correct)
Which is an important difference between IT systems and IACS?
Available Choices (select all choices that are correct)
What are the three main components of the ISASecure Integrated Threat Analysis (ITA) Program?
Available Choices (select all choices that are correct)
Which is the PRIMARY objective when defining a security zone?
Available Choices (select all choices that are correct)
Which is the PRIMARY reason why Modbus over Ethernet is easy to manaqe in a firewall?
Available Choices (select all choices that are correct)
What is a feature of an asymmetric key?
Available Choices (select all choices that are correct)
Which is a physical layer standard for serial communications between two or more devices?
Available Choices (select all choices that are correct)
What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?