Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISA ISA-IEC-62443 - ISA/IEC 62443 Cybersecurity Fundamentals Specialist

Page: 4 / 7
Total 227 questions

In terms of availability requirements, how do IACS and IT differ?

A.

IACS tolerates occasional failures while IT does not.

B.

Rebooting is never acceptable in IT but tolerated in IACS.

C.

Both IACS and IT have the same availability requirements.

D.

Continuous operation is expected in IT while scheduled operation is sufficient for IACS.

Which service does an Intrusion Detection System (IDS) provide?

Available Choices (select all choices that are correct)

A.

It is the lock on the door for networks and computer systems.

B.

It is effective against all vulnerabilities in networks and computer systems.

C.

It blocks malicious activity in networks and computer systems.

D.

It detects attempts to break into or misuse a computer system.

Which organization manages the ISASecure conformance certification program?

Available Choices (select all choices that are correct)

A.

American Society for Industrial Security

B.

Automation Federation

C.

National Institute of Standards and Technology

D.

Security Compliance Institute

How many maturity levels (ML) are established for evaluation criteria according to ISA/IEC 62443-2-4?

A.

2

B.

3

C.

4

D.

5

Which of the following BEST describes 'Vulnerability'?

A.

An exploitable flaw in management

B.

An event that could breach security

C.

The potential for violation of security

D.

The result that occurs from a particular incident

If a U.S. federal agency must comply with mandatory cybersecurity requirements under law, which document would they be required to follow?

A.

NIST FIPS

B.

ISA/IEC 62443

C.

EU Cyber Resilience Act

D.

NIST Special Publication 800-171

A national standards body wants to represent its country’s interests at an international level and adopt global standards locally. What role does this organization fulfill?

A.

Global SDO

B.

Regulatory Agency

C.

Industry Consortium

D.

National Standardization Body

Which is a commonly used protocol for managing secure data transmission on the Internet?

Available Choices (select all choices that are correct)

A.

Datagram Transport Layer Security (DTLS)

B.

Microsoft Point-to-Point Encryption

C.

Secure Telnet

D.

Secure Sockets Layer

How should patching be approached within an organization?

A.

By ignoring downtime and costs

B.

Only after a cyberattack has occurred

C.

As part of the broader risk management strategy

D.

As a purely technical task with no business implications

Which of the following BEST describes a control system?

A.

Actions to prevent loss of revenue

B.

Unauthorized modifications to data

C.

Hardware and software components of an IACS

D.

Measures taken to protect against unauthorized access