Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?
Available Choices (select all choices that are correct)
What are the connections between security zones called?
Available Choices (select all choices that are correct)
Which of the following is an element of security policy, organization, and awareness?
Available Choices (select all choices that are correct)
What programs are MOST effective if they are tailored to the audience, consistent with company policy, and communicated regularly?
The Risk Analysis category contains background information that is used where?
Available Choices (select all choices that are correct)
Which of the following are the critical variables related to access control?
Available Choices (select all choices that are correct)
Which organization manages the ISASecure conformance certification program?
Available Choices (select all choices that are correct)
What is a key aspect of the relationship between physical security measures and cybersecurity?
Which of the following PRIMARILY determines access privileges for user accounts?
Available Choices (select all choices that are correct)
Which of the following is a recommended default rule for IACS firewalls?
Available Choices (select all choices that are correct)
How should CSMS organizational responsibilities or training be handled over time?
Which of the following provides the overall conceptual basis in the design of an appropriate security program?
Available Choices (select all choices that are correct)
Which communications system covers a large geographic area?
Available Choices (select all choices that are correct)
Multiuser accounts and shared passwords inherently carry which of the followinq risks?
Available Choices (select all choices that are correct)
To which category of the ISA-62443 (IEC 62443) series does the document titled “Patch management in the IACS environment” belong?
Authorization (user accounts) must be granted based on which of the following?
Available Choices (select all choices that are correct)
Which service does an Intrusion Detection System (IDS) provide?
Available Choices (select all choices that are correct)
What is the purpose of ISO/IEC 15408 (Common Criteria)?
Available Choices (select all choices that are correct)
How many element qroups are in the "Addressinq Risk" CSMS cateqorv?
Available Choices (select all choices that are correct)
Which is NOT a potential consequence for organizations that fail to prioritize control system security?
What are the four documents that belong to the General category of the ISA-62443 (IEC 62443) series?
After receiving an approved patch from the JACS vendor, what is BEST practice for the asset owner to follow?
Which characteristic is MOST closely associated with the deployment of a demilitarized zone (DMZ)?
Available Choices (select all choices that are correct)
What are three possible entry points (pathways) that could be used for launching a cyber attack?
Available Choices (select all choices that are correct)
Which statement is TRUE regarding Intrusion Detection Systems (IDS)?
Available Choices (select all choices that are correct)
Which is an important difference between IT systems and IACS?
Available Choices (select all choices that are correct)
What is a feature of an asymmetric key?
Available Choices (select all choices that are correct)