Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISA ISA-IEC-62443 - ISA/IEC 62443 Cybersecurity Fundamentals Specialist

Page: 5 / 5
Total 215 questions

Which layer specifies the rules for Modbus Application Protocol

Available Choices (select all choices that are correct)

A.

Data link layer

B.

Session layer

C.

Presentation layer

D.

Application layer

Which of the following technologies is no longer considered secure?

A.

Secure Sockets Layer (SSL)

B.

Transport Layer Security (TLS)

C.

Digital Encryption Standard (DES)

D.

Advanced Encryption Standard (AES)

Which of the following is an activity that should trigger a review of the CSMS?

Available Choices (select all choices that are correct)

A.

Budgeting

B.

New technical controls

C.

Organizational restructuring

D.

Security incident exposing previously unknown risk.

What is a requirement for product security development lifecycles?

A.

Risk management

B.

Agile development

C.

Continuous integration

D.

Defense-in-depth strategy

Which steps are part of implementing countermeasures?

Available Choices (select all choices that are correct)

A.

Establish the risk tolerance and select common countermeasures.

B.

Establish the risk tolerance and update the business continuity plan.

C.

Select common countermeasures and update the business continuity plan.

D.

Select common countermeasures and collaborate with stakeholders.