Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

ISA-IEC-62443 Questions and Answers

Question # 6

Which layer is responsible for error checking and MAC addressing?

A.

Network

B.

Transport

C.

Application

D.

Data link

Full Access
Question # 7

Within the National Institute of Standards and Technoloqv Cybersecuritv Framework v1.0 (NIST CSF), what is the status of the ISA 62443 standards?

Available Choices (select all choices that are correct)

A.

They are used as informative references.

B.

They are used as normative references.

C.

They are under consideration for future use.

D.

They are not used.

Full Access
Question # 8

Which factor drives the selection of countermeasures?

Available Choices (select all choices that are correct)

A.

Foundational requirements

B.

Output from a risk assessment

C.

Security levels

D.

System design

Full Access
Question # 9

Which of the following are the critical variables related to access control?

Available Choices (select all choices that are correct)

A.

Reporting and monitoring

B.

Account management and monitoring

C.

Account management and password strength

D.

Password strength and change frequency

Full Access
Question # 10

After receiving an approved patch from the JACS vendor, what is BEST practice for the asset owner to follow?

A.

If a low priority, there is no need to apply the patch.

B.

If a medium priority, schedule the installation within three months after receipt.

C.

If a high priority, apply the patch at the first unscheduled outage.

D.

If no problems are experienced with the current IACS, it is not necessary to apply the patch.

Full Access
Question # 11

In a defense-in-depth strategy, what is the purpose of role-based access control?

Available Choices (select all choices that are correct)

A.

Ensures that users can access systems from remote locations

B.

Ensures that users can access only certain devices on the network

C.

Ensures that users can access only the functions they need for their job

D.

Ensures that users correctly manage their username and password

Full Access
Question # 12

What type of malware disrupted an emergency shutdown capability in safety systems?

A.

Zeus

B.

Stuxnet

C.

WannaCry

D.

Triton or Trisis

Full Access
Question # 13

Security Levels (SLs) are broken down into which three types?

Available Choices (select all choices that are correct)

A.

SL-1, SL-2, and SL-3

B.

Target.capability, and achieved

C.

Target.capability, and availability

D.

Target.capacity, and achieved

Full Access
Question # 14

What is one of the primary causes of cyber-related production losses in process control systems?

A.

Human error

B.

Hardware failure

C.

Malware incidents

D.

Network congestion

Full Access
Question # 15

Which steps are part of implementing countermeasures?

Available Choices (select all choices that are correct)

A.

Establish the risk tolerance and select common countermeasures.

B.

Establish the risk tolerance and update the business continuity plan.

C.

Select common countermeasures and update the business continuity plan.

D.

Select common countermeasures and collaborate with stakeholders.

Full Access
Question # 16

Which part of the standard provides a list of possible Foundational Requirements to address assessed risks?

A.

ISA/IEC 62443-3-1

B.

ISA/IEC 62443-3-2

C.

ISA/IEC 62443-3-3

D.

ISA/IEC 62443-3-4

Full Access
Question # 17

Which of the following is an element of monitoring and improving a CSMS?

Available Choices (select all choices that are correct)

A.

Increase in staff training and security awareness

B.

Restricted access to the industrial control system to an as-needed basis

C.

Significant changes in identified risk round in periodic reassessments

D.

Review of system logs and other key data files

Full Access
Question # 18

Which model describes relationships between assets within an industrial automation and control system?

A.

Asset model

B.

Zone model

C.

Security level model

D.

Reference architecture

Full Access
Question # 19

What are the four documents that belong to the General category of the ISA-62443 (IEC 62443) series?

A.

Part 1-1: Terminology, concepts, and models; Part 1-2: Master glossary of terms and definitions; Part 1-3: Security program ratings; and Part 1-4: IACS security lifecycle and use cases

B.

Part 1-1: Terminology, concepts, and models; Part 1-2: Master glossary of terms and definitions; Part 1-3: Security technologies for IACS; and Part 1-4: IACS security lifecycle and use cases

C.

Part 1-1: Terminology, concepts, and models; Part 1-2: Master glossary of terms and definitions; Part 1-3: System security conformance metrics; and Part 1-4: IACS security lifecycle and use cases

D.

Part 1-1: Terminology, concepts, and models; Part 1-2: Master glossary of terms and definitions; Part 1-3: System security conformance metrics; and Part 1-4: Security program requirements for IACS service providers

Full Access
Question # 20

What does the first group of the ISA/IEC 62443 series focus on?

A.

Policies and procedures

B.

System technology aspects

C.

General standards and reports

D.

Component security requirements

Full Access
Question # 21

How should CSMS organizational responsibilities or training be handled over time?

A.

They should be ignored.

B.

They should be evaluated.

C.

They should remain constant.

D.

They should be expanded indefinitely.

Full Access
Question # 22

What is the primary focus of Part 3-2 in the ISA/IEC 62443 series?

A.

Security technologies for IACS

B.

Cybersecurity risk assessment and system design

C.

Secure product development lifecycle requirements

D.

Technical security requirements for IACS components

Full Access
Question # 23

Which of the following is a trend that has caused a significant percentage of security vulnerabilities?

Available Choices (select all choices that are correct)

A.

IACS developing into a network of air-gapped systems

B.

IACS evolving into a number of closed proprietary systems

C.

IACS using equipment designed for measurement and control

D.

IACS becoming integrated with business and enterprise systems

Full Access
Question # 24

What are the two sublayers of Layer 2?

Available Choices (select all choices that are correct)

A.

HIDS and NIDS

B.

LLC and MAC

C.

OPC and DCOM

D.

VLAN and VPN

Full Access
Question # 25

Multiuser accounts and shared passwords inherently carry which of the followinq risks?

Available Choices (select all choices that are correct)

A.

Privilege escalation

B.

Buffer overflow

C.

Unauthorized access

D.

Race conditions

Full Access
Question # 26

Which communications system covers a large geographic area?

Available Choices (select all choices that are correct)

A.

Campus Area Network (CAN)

B.

Local Area Network (LAN)

C.

Storage Area Network

D.

Wide Area Network (WAN)

Full Access
Question # 27

Which protocol is commonly used for managing the security of message transmission on the Internet via web browsers?

A.

TLS

B.

L2TP

C.

PPTP

D.

IPsec

Full Access
Question # 28

How can defense in depth be achieved via security zones?

A.

By having zones within zones, or subzones, that provide layered security

B.

By having a zone edge that is using the security policies of the asset owner

C.

By having zones that are connected via conduits using the latest version of SSL

D.

By having zones that separate sensors from actuators, that provide layered security

Full Access
Question # 29

Why is OPC Classic considered firewall unfriendly?

Available Choices (select all choices that are correct)

A.

OPC Classic uses DCOM, which dynamically assigns any port between 1024 and 65535.

B.

OPC Classic is allowed to use only port 80.

C.

OPC Classic works with control devices from different manufacturers.

D.

OPC Classic is an obsolete communication standard.

Full Access
Question # 30

To which category of the ISA-62443 (IEC 62443) series does the document titled “Patch management in the IACS environment” belong?

A.

System

B.

General

C.

Component

D.

Policies and Procedures

Full Access
Question # 31

What does Foundational Requirement 6 (FR 6) - Timely Response to Events (TRE) require?

A.

Control access to information

B.

Protect against unauthorized operation

C.

Notify the proper authority about security violations

D.

Ensure adequate responses to network resource requests

Full Access
Question # 32

What does the abbreviation CSMS round in ISA 62443-2-1 represent?

Available Choices (select all choices that are correct)

A.

Control System Management System

B.

Control System Monitoring System

C.

Cyber Security Management System

D.

Cyber Security Monitoring System

Full Access
Question # 33

Why were PLCs originally designed?

A.

To replace relays

B.

To service I/O exclusively

C.

To enhance network security

D.

To improve Ethernet functionality

Full Access
Question # 34

What is the primary audience for Part 2-5 of the ISA/IEC 62443 Series - Policies & Procedures group of standards?

A.

Asset owners

B.

Service providers

C.

Product suppliers

D.

System integrators

Full Access
Question # 35

What is recommended to use between the plant floor and the rest of the company networks?

A.

Hub

B.

Router

C.

Switch

D.

Firewall

Full Access
Question # 36

What programs are MOST effective if they are tailored to the audience, consistent with company policy, and communicated regularly?

A.

CSMS development programs

B.

Cybersecurity awareness programs

C.

Control systems adjustment programs

D.

ISCS cybersecurity certification programs

Full Access
Question # 37

What type of security level defines what a component or system is capable of meeting?

Available Choices (select all choices that are correct)

A.

Capability security level

B.

Achieved security level

C.

Design security level

D.

Target security level

Full Access
Question # 38

Which activity is part of establishing policy, organization, and awareness?

Available Choices (select all choices that are correct)

A.

Communicate policies.

B.

Establish the risk tolerance.

C.

Identify detailed vulnerabilities.

D.

Implement countermeasures.

Full Access
Question # 39

Which of the following is NOT a strategy for deploying a WAN?

A.

Internet

B.

Enterprise WANs

C.

Local area networks

D.

Carrier-managed WANs

Full Access
Question # 40

In an IACS system, a typical security conduit consists of which of the following assets?

Available Choices (select all choices that are correct)

A.

Controllers, sensors, transmitters, and final control elements

B.

Wiring, routers, switches, and network management devices

C.

Ferrous, thickwall, and threaded conduit including raceways

D.

Power lines, cabinet enclosures, and protective grounds

Full Access
Question # 41

What is a key activity in the Maintain phase?

A.

Risk assessment

B.

Managing changes

C.

Allocating assets to security zones

D.

Designing cybersecurity countermeasures

Full Access
Question # 42

Which is the BEST deployment system for malicious code protection?

Available Choices (select all choices that are correct)

A.

Network segmentation

B.

IACS protocol converters

C.

Application whitelistinq (AWL) OD.

D.

Zones and conduits

Full Access
Question # 43

What do packet filter firewalls examine?

Available Choices (select all choices that are correct)

A.

The packet structure and sequence

B.

The relationships between packets in a session

C.

Every incoming packet up to the application layer

D.

Only the source, destination, and ports in the header of each packet

Full Access
Question # 44

Which of the following is NOT a general class of firewalls?

A.

Packet filter

B.

Network monitor

C.

Application proxy

D.

Stateful inspection

Full Access
Question # 45

What does IACS stand for?

A.

Industrial Automation and Control Systems

B.

Industrial Associations and Control Systems

C.

Integrated Automation and Control Systems

D.

International Automated and Control Systems

Full Access