Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISA ISA-IEC-62443 - ISA/IEC 62443 Cybersecurity Fundamentals Specialist

Page: 4 / 5
Total 215 questions

How can defense in depth be achieved via security zones?

A.

By having zones within zones, or subzones, that provide layered security

B.

By having a zone edge that is using the security policies of the asset owner

C.

By having zones that are connected via conduits using the latest version of SSL

D.

By having zones that separate sensors from actuators, that provide layered security

What are three possible entry points (pathways) that could be used for launching a cyber attack?

Available Choices (select all choices that are correct)

A.

LAN, portable media, and wireless

B.

LAN, portable media, and hard drives

C.

LAN, power source, and wireless OD.

D.

LAN, WAN, and hard drive

What is a key activity in the Maintain phase?

A.

Risk assessment

B.

Managing changes

C.

Allocating assets to security zones

D.

Designing cybersecurity countermeasures

Why were PLCs originally designed?

A.

To replace relays

B.

To service I/O exclusively

C.

To enhance network security

D.

To improve Ethernet functionality

Which model describes relationships between assets within an industrial automation and control system?

A.

Asset model

B.

Zone model

C.

Security level model

D.

Reference architecture

What type of cyberattack was discussed in the Ukrainian power grid case study?

A.

Internal sabotage

B.

Nation state

C.

Insider threat

D.

Random hacking

Which of the following is the BEST example of detection-in-depth best practices?

Available Choices (select all choices that are correct)

A.

Firewalls and unexpected protocols being used

B.

IDS sensors deployed within multiple zones in the production environment

C.

Role-based access control and unusual data transfer patterns

D.

Role-based access control and VPNs

What.are the two elements of the risk analysis category of an IACS?

Available Choices (select all choices that are correct)

A.

Risk evaluation and risk identification

B.

Business rationale and risk reduction and avoidance

C.

Business rationale and risk identification and classification

D.

Business recovery and risk elimination or mitigation

Which is a commonly used protocol for managing secure data transmission on the Internet?

Available Choices (select all choices that are correct)

A.

Datagram Transport Layer Security (DTLS)

B.

Microsoft Point-to-Point Encryption

C.

Secure Telnet

D.

Secure Sockets Layer

What does ISASecure primarily focus on?

A.

Developing internal testing labs

B.

Certifying IACS products and systems for cybersecurity

C.

Offering assessments for integrator site engineering practices

D.

Managing asset owner operations and maintenance practices