Within the National Institute of Standards and Technoloqv Cybersecuritv Framework v1.0 (NIST CSF), what is the status of the ISA 62443 standards?
Available Choices (select all choices that are correct)
Which factor drives the selection of countermeasures?
Available Choices (select all choices that are correct)
Which of the following are the critical variables related to access control?
Available Choices (select all choices that are correct)
After receiving an approved patch from the JACS vendor, what is BEST practice for the asset owner to follow?
In a defense-in-depth strategy, what is the purpose of role-based access control?
Available Choices (select all choices that are correct)
What type of malware disrupted an emergency shutdown capability in safety systems?
Security Levels (SLs) are broken down into which three types?
Available Choices (select all choices that are correct)
What is one of the primary causes of cyber-related production losses in process control systems?
Which steps are part of implementing countermeasures?
Available Choices (select all choices that are correct)
Which part of the standard provides a list of possible Foundational Requirements to address assessed risks?
Which of the following is an element of monitoring and improving a CSMS?
Available Choices (select all choices that are correct)
Which model describes relationships between assets within an industrial automation and control system?
What are the four documents that belong to the General category of the ISA-62443 (IEC 62443) series?
How should CSMS organizational responsibilities or training be handled over time?
Which of the following is a trend that has caused a significant percentage of security vulnerabilities?
Available Choices (select all choices that are correct)
What are the two sublayers of Layer 2?
Available Choices (select all choices that are correct)
Multiuser accounts and shared passwords inherently carry which of the followinq risks?
Available Choices (select all choices that are correct)
Which communications system covers a large geographic area?
Available Choices (select all choices that are correct)
Which protocol is commonly used for managing the security of message transmission on the Internet via web browsers?
Why is OPC Classic considered firewall unfriendly?
Available Choices (select all choices that are correct)
To which category of the ISA-62443 (IEC 62443) series does the document titled “Patch management in the IACS environment” belong?
What does Foundational Requirement 6 (FR 6) - Timely Response to Events (TRE) require?
What does the abbreviation CSMS round in ISA 62443-2-1 represent?
Available Choices (select all choices that are correct)
What is the primary audience for Part 2-5 of the ISA/IEC 62443 Series - Policies & Procedures group of standards?
What is recommended to use between the plant floor and the rest of the company networks?
What programs are MOST effective if they are tailored to the audience, consistent with company policy, and communicated regularly?
What type of security level defines what a component or system is capable of meeting?
Available Choices (select all choices that are correct)
Which activity is part of establishing policy, organization, and awareness?
Available Choices (select all choices that are correct)
In an IACS system, a typical security conduit consists of which of the following assets?
Available Choices (select all choices that are correct)
Which is the BEST deployment system for malicious code protection?
Available Choices (select all choices that are correct)
What do packet filter firewalls examine?
Available Choices (select all choices that are correct)