Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISA ISA-IEC-62443 - ISA/IEC 62443 Cybersecurity Fundamentals Specialist

Page: 2 / 7
Total 227 questions

Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?

A.

Aligned development process

B.

Aligned needs of industrial users

C.

Well-documented security policies and procedures

D.

Defense-in-depth approach to designing

Which of the following protocols is mentioned as being commonly used in control systems?

A.

FTP

B.

HTTP

C.

SMTP

D.

Modbus TCP

Which of the following is an example of a device used for intrusion detection?

A.

Router

B.

Switch

C.

Firewall

D.

Host-based IDS

What is the primary goal of the Assess phase in the IACS Cybersecurity Lifecycle?

A.

To conduct periodic audits

B.

To implement countermeasures

C.

To assign a Target Security Level (SL-T)

D.

To ensure the Achieved Security Level (SL-A) meets the Target Security Level (SL-T)

A manufacturing plant wants to improve its risk management by categorizing all equipment and tracking their status and relationships. Which framework should it implement?

A.

Conduits

B.

Asset models

C.

Security zones

D.

Reference architecture

Which statement is TRUE reqardinq application of patches in an IACS environment?

Available Choices (select all choices that are correct)

A.

Patches should be applied as soon as they are available.

B.

Patches should be applied within one month of availability.

C.

Patches never should be applied in an IACS environment.

D.

Patches should be applied based on the organization's risk assessment.

Which of the following ISA-99 (IEC 62443) Reference Model levels is named correctly?

A.

Level 1: Supervisory Control

B.

Level 2: Quality Control

C.

Level 3: Operations Management

D.

Level 4: Process

Which is the PRIMARY reason why Modbus over Ethernet is easy to manaqe in a firewall?

Available Choices (select all choices that are correct)

A.

Modbus uses a single master to communicate with multiple slaves usinq simple commands.

B.

Modbus is a proprietary protocol that is widely supported by vendors.

C.

Modbus uses explicit source and destination IP addresses and a sinqle known TCP port.

D.

Modbus has no known security vulnerabilities, so firewall rules are simple to implement.

What.are the two elements of the risk analysis category of an IACS?

Available Choices (select all choices that are correct)

A.

Risk evaluation and risk identification

B.

Business rationale and risk reduction and avoidance

C.

Business rationale and risk identification and classification

D.

Business recovery and risk elimination or mitigation

A plant has several zones including business, safety-critical, and wireless zones. According to ISA/IEC 62443, how should these zones be managed during risk assessment?

A.

Combine all zones into one for simplicity.

B.

Ignore physical location when grouping assets.

C.

Establish clear separation between zones based on criticality.

D.

Treat temporarily connected devices as part of the safety zone permanently.