Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISA ISA-IEC-62443 - ISA/IEC 62443 Cybersecurity Fundamentals Specialist

Page: 2 / 5
Total 215 questions

In the context of global frameworks, what does the acronym SDO stand for?

A.

Security Development Organization

B.

Software Development Organization

C.

Systematic Development Organization

D.

Standards Development Organization

What is the FIRST step required in implementing ISO 27001?

Available Choices (select all choices that are correct)

A.

Create a security management organization.

B.

Define an information security policy.

C.

Implement strict security controls.

D.

Perform a security risk assessment.

Which of the following starts at a high level and includes all ANSI/ISA-95 Level 0,1,2,3,4 equipment and information systems?

A.

Zone model

B.

Asset model

C.

Reference model

D.

Reference architecture

Which part of the standard provides a list of possible Foundational Requirements to address assessed risks?

A.

ISA/IEC 62443-3-1

B.

ISA/IEC 62443-3-2

C.

ISA/IEC 62443-3-3

D.

ISA/IEC 62443-3-4

Which of the following staff is NOT mentioned as a stakeholder in the CSMS Program?

A.

Marketing

B.

Operations

C.

IT security

D.

Physical security

What is TRUE regarding safety systems?

A.

No dedicated malware has been found targeting safety systems specifically.

B.

Even the most modern and sophisticated safety systems can be defeated by an attacker.

C.

Safety systems are an independent protection layer and as such have no cybersecurity vulnerabilities.

D.

By integrating control and safety systems via Modbus TCP, cybersecurity risks are at a tolerable level.

What does Layer 1 of the ISO/OSI protocol stack provide?

Available Choices (select all choices that are correct)

A.

Data encryption, routing, and end-to-end connectivity

B.

Framing, converting electrical signals to data, and error checking

C.

The electrical and physical specifications of the data connection

D.

User applications specific to network applications such as reading data registers in a PLC

What is the primary purpose of Foundational Requirement 1 (FR 1)?

A.

Ensure data confidentiality.

B.

Respond to security violations.

C.

Control use of selected devices.

D.

Control access to selected devices.

Which standard is recognized as part of the NIST CSF Informative References?

A.

COBIT 5

B.

PCI DSS

C.

ISO 9001

D.

ISA/IEC 62443

What is a key feature of the NIS2 Directive?

A.

It mandates compliance with all standards.

B.

It focuses solely on physical security regulations.

C.

It establishes a cyber crisis management structure.

D.

It eliminates the need for public-private partnerships.