Which of the following activities is NOT listed under the “Patch Testing” phase in the asset owner requirements?
What is one of the primary causes of cyber-related production losses in process control systems?
Which steps are included in the ISA/IEC 62443 assess phase?
Available Choices (select all choices that are correct)
Which of the following can be employed as a barrier device in a segmented network?
Available Choices (select all choices that are correct)
A manufacturing plant is developing a cybersecurity plan for its IACS that must evolve as new threats emerge and system changes occur. Which document should serve as the foundation for this evolving security approach?
What type of malware disrupted an emergency shutdown capability in safety systems?
What is a major reason for maintaining an asset inventory baseline in Configuration Management (SP Element 2)?
How many element groups are in the "Addressing Risk" CSMS category?
Available Choices (select all choices that are correct)
What are the three main components of the ISASecure Integrated Threat Analysis (ITA) Program?
Available Choices (select all choices that are correct)
In a defense-in-depth strategy, what is the purpose of role-based access control?
Available Choices (select all choices that are correct)
What are the two sublayers of Layer 2?
Available Choices (select all choices that are correct)
What are the connections between security zones called?
Available Choices (select all choices that are correct)
If a U.S. federal agency must comply with mandatory cybersecurity requirements under law, which document would they be required to follow?
After receiving an approved patch from the JACS vendor, what is BEST practice for the asset owner to follow?
Which of the following ISA-99 (IEC 62443) Reference Model levels is named correctly?
Which of the following is an element of monitoring and improving a CSMS?
Available Choices (select all choices that are correct)
Which of the following provides the overall conceptual basis in the design of an appropriate security program?
Available Choices (select all choices that are correct)
Which policies and procedures publication is titled Patch Manaqement in the IACS Environment?
Available Choices (select all choices that are correct)
A multinational corporation needs to implement a cybersecurity framework that can be adapted across different countries and industries while allowing continuous improvement. Which feature of the NIST CSF makes it suitable for this purpose?
Which model describes relationships between assets within an industrial automation and control system?
Which part of the ISA/IEC 62443 series describes a methodology to develop quantitative metrics?
Which of the following is an element of security policy, organization, and awareness?
Available Choices (select all choices that are correct)
Which of the following is the underlying protocol for Ethernet/IP?
Available Choices (select all choices that are correct)
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
To which category of the ISA-62443 (IEC 62443) series does the document titled "Patch management in the IACS environment" belong?
Which is the PRIMARY objective when defining a security zone?
Available Choices (select all choices that are correct)
Which of the following is an example of separation of duties as a part of system development and maintenance?
Available Choices (select all choices that are correct)
A company needs to create a standardized interface for exchanging real-time plant data between heterogeneous control devices while maintaining a structured organization of data elements such as folders, classes, and methods. Which feature of OPC supports this requirement?
Multiuser accounts and shared passwords inherently carry which of the followinq risks?
Available Choices (select all choices that are correct)
Why is segmentation from non-IACS zones important in Network & Communication Security (SP Element 3)?
Which of the following are the critical variables related to access control?
Available Choices (select all choices that are correct)
During the operation of an IACS, who is responsible for executing the Security Protection Scheme (SPS) process measures and responding to emerging risks?
Which of the following activities is NOT listed under the "Patch Testing" phase in the asset owner requirements?
Which is an important difference between IT systems and IACS?
Available Choices (select all choices that are correct)
Which of the following is NOT listed as a potential consequence of compromising IACS according to the ISA99 Committee scope?
What are the four documents that belong to the General category of the ISA-62443 (IEC 62443) series?
What do packet filter firewalls examine?
Available Choices (select all choices that are correct)
Which of the following is NOT listed as a potential consequence of compromising IACS according to the ISA99 Committee scope?
Which factor drives the selection of countermeasures?
Available Choices (select all choices that are correct)
Which organization manages the ISASecure conformance certification program?
Available Choices (select all choices that are correct)
Which statement is TRUE regarding Intrusion Detection Systems (IDS)?
Available Choices (select all choices that are correct)
Which of the following is a trend that has caused a significant percentage of security vulnerabilities?
Available Choices (select all choices that are correct)
If an asset owner wants to improve their organization's ability to respond during a cyberattack, which of the following activities would be MOST appropriate to implement?
In what step of the development process of the CSMS is “Establish purpose, organizational support, resources, and scope” taken care of?
Why is patch management more difficult for IACS than for business systems?
Available Choices (select all choices that are correct)
If an industrial control system experiences frequent unexpected shutdowns causing downtime, which SP Element activities should be reviewed to improve system availability?
Which protocol is commonly used for managing the security of message transmission on the Internet via web browsers?
Which steps are part of implementing countermeasures?
Available Choices (select all choices that are correct)
What does the System under Consideration (SuC) include in the context of ISA/IEC 62443 risk assessment?
Which characteristic is MOST closely associated with the deployment of a demilitarized zone (DMZ)?
Available Choices (select all choices that are correct)
Which communications system covers a large geographic area?
Available Choices (select all choices that are correct)