Valentine Day Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ISA-IEC-62443 Questions and Answers

Question # 6

Which of the following is an example of separation of duties as a part of system development and maintenance?

Available Choices (select all choices that are correct)

A.

Changes are approved by one party and implemented by another.

B.

Configuration settings are made by one party and self-reviewed using a checklist.

C.

Developers write and then test their own code.

D.

Design and implementation are performed by the same team.

Full Access
Question # 7

What type of security level defines what a component or system is capable of meeting?

Available Choices (select all choices that are correct)

A.

Capability security level

B.

Achieved security level

C.

Design security level

D.

Target security level

Full Access
Question # 8

Why is OPC Classic considered firewall unfriendly?

Available Choices (select all choices that are correct)

A.

OPC Classic uses DCOM, which dynamically assigns any port between 1024 and 65535.

B.

OPC Classic is allowed to use only port 80.

C.

OPC Classic works with control devices from different manufacturers.

D.

OPC Classic is an obsolete communication standard.

Full Access
Question # 9

Which is a common pitfall when initiating a CSMS program?

Available Choices (select all choices that are correct)

A.

Organizational lack of communication

B.

Failure to relate to the mission of the organization

C.

Insufficient documentation due to lack of good follow-up

D.

Immediate jump into detailed risk assessment

Full Access
Question # 10

What are the connections between security zones called?

Available Choices (select all choices that are correct)

A.

Firewalls

B.

Tunnels

C.

Pathways

D.

Conduits

Full Access
Question # 11

What is the name of the protocol that implements serial Modbus over Ethernet?

Available Choices (select all choices that are correct)

A.

MODBUS/CIP

B.

MODBUS/Ethernet

C.

MODBUS/Plus

D.

MODBUS/TCP

Full Access
Question # 12

Whose responsibility is it to determine the level of risk an organization is willing to tolerate?

Available Choices (select all choices that are correct)

A.

Management

B.

Legal Department

C.

Operations Department

D.

Safety Department

Full Access
Question # 13

Which is the BEST deployment system for malicious code protection?

Available Choices (select all choices that are correct)

A.

Network segmentation

B.

IACS protocol converters

C.

Application whitelistinq (AWL) OD.

D.

Zones and conduits

Full Access
Question # 14

What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?

Available Choices (select all choices that are correct)

A.

HTTPS

B.

IPSec

C.

MPLS

D.

SSH

Full Access
Question # 15

What is defined as the hardware and software components of an IACS?

Available Choices (select all choices that are correct)

A.

COTS software and hardware

B.

Electronic security

C.

Control system

D.

Cybersecuritv

Full Access
Question # 16

Which of the following refers to internal rules that govern how an organization protects critical system resources?

Available Choices (select all choices that are correct)

A.

Formal guidance

B.

Legislation

C.

Security policy

D- Code of conduct

Full Access
Question # 17

Authorization (user accounts) must be granted based on which of the following?

Available Choices (select all choices that are correct)

A.

Individual preferences

B.

Common needs for large groups

C.

Specific roles

D.

System complexity

Full Access
Question # 18

Which of the following is a cause for the increase in attacks on IACS?

Available Choices (select all choices that are correct)

A.

Use of proprietary communications protocols

B.

The move away from commercial off the shelf (COTS) systems, protocols, and networks

C.

Knowledge of exploits and tools readily available on the Internet

D.

Fewer personnel with system knowledge having access to IACS

Full Access
Question # 19

Which policies and procedures publication is titled Patch Manaqement in the IACS Environment?

Available Choices (select all choices that are correct)

A.

ISA-TR62443-2-3

B.

ISA-TR62443-1-4

C.

ISA-62443-3-3

D.

ISA-62443-4-2

Full Access
Question # 20

In which layer is the physical address assigned?

Available Choices (select all choices that are correct)

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 7

Full Access
Question # 21

Which service does an Intrusion Detection System (IDS) provide?

Available Choices (select all choices that are correct)

A.

It is the lock on the door for networks and computer systems.

B.

It is effective against all vulnerabilities in networks and computer systems.

C.

It blocks malicious activity in networks and computer systems.

D.

It detects attempts to break into or misuse a computer system.

Full Access
Question # 22

Which of the following is the BEST example of detection-in-depth best practices?

Available Choices (select all choices that are correct)

A.

Firewalls and unexpected protocols being used

B.

IDS sensors deployed within multiple zones in the production environment

C.

Role-based access control and unusual data transfer patterns

D.

Role-based access control and VPNs

Full Access
Question # 23

Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?

Available Choices (select all choices that are correct)

A.

Forwards packets, including routing through intermediate routers

B.

Gives transparent transfer of data between end users

C.

Provides the rules for framing, converting electrical signals to data

D.

Handles the physics of getting a message from one device to another

Full Access
Question # 24

Which statement is TRUE reqardinq application of patches in an IACS environment?

Available Choices (select all choices that are correct)

A.

Patches should be applied as soon as they are available.

B.

Patches should be applied within one month of availability.

C.

Patches never should be applied in an IACS environment.

D.

Patches should be applied based on the organization's risk assessment.

Full Access
Question # 25

What is the definition of "defense in depth" when referring to

Available Choices (select all choices that are correct)

A.

Using countermeasures that have intrinsic technical depth.

B.

Aligning all resources to provide a broad technical gauntlet

C.

Requiring a minimum distance requirement between security assets

D.

Applying multiple countermeasures in a layered or stepwise manner

Full Access
Question # 26

Which of the following are the critical variables related to access control?

Available Choices (select all choices that are correct)

A.

Reporting and monitoring

B.

Account management and monitoring

C.

Account management and password strength

D.

Password strength and change frequency

Full Access