Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISA ISA-IEC-62443 - ISA/IEC 62443 Cybersecurity Fundamentals Specialist

Page: 5 / 7
Total 227 questions

What does the expression SL-T (BPCS Zone) vector {2 2 0 1 3 1 3} represent?

A.

A qualitative risk assessment method

B.

A single protection factor for all FRs

C.

The FR values for a specific zone's security level

D.

The SL values for a specific zone's foundational requirements

Which of the following is an industry sector-specific standard?

Available Choices (select all choices that are correct)

A.

ISA-62443 (EC 62443)

B.

NIST SP800-82

C.

API 1164

D.

D. ISO 27001

A company manufactures embedded devices and network components used in control systems but does not participate in on-site installation or maintenance. What role do they fulfill?

A.

Asset owner

B.

Product supplier

C.

Integration service provider

D.

Maintenance service provider

What do packet filter firewalls examine?

Available Choices (select all choices that are correct)

A.

The packet structure and sequence

B.

The relationships between packets in a session

C.

Every incoming packet up to the application layer

D.

Only the source, destination, and ports in the header of each packet

Which is a role of the application layer?

Available Choices (select all choices that are correct)

A.

Includes protocols specific to network applications such as email, file transfer, and reading data registers in a PLC

B.

Includes user applications specific to network applications such as email, file transfer, and reading data registers in a PLC

C.

Provides the mechanism for opening, closing, and managing a session between end-user application processes

D.

Delivers and formats information, possibly with encryption and security

Which is an important difference between IT systems and IACS?

Available Choices (select all choices that are correct)

A.

The IACS security priority is integrity.

B.

The IT security priority is availability.

C.

IACS cybersecurity must address safety issues.

D.

Routers are not used in IACS networks.

Which standard is recognized as part of the NIST CSF Informative References?

A.

COBIT 5

B.

PCI DSS

C.

ISO 9001

D.

ISA/IEC 62443

Which is an important difference between IT systems and IACS?

A.

The IACS security priority is integrity.

B.

The IT security priority is availability.

C.

IACS cybersecurity must address safety issues.

D.

Routers are not used in IACS networks.

Which of the following is NOT listed as a potential consequence of compromising IACS according to the ISA99 Committee scope?

A.

Increased product sales

B.

Endangerment of public safety

C.

Loss of proprietary information

D.

Economic and operational losses

Which protocol is commonly used for managing the security of message transmission on the Internet via web browsers?

A.

TLS

B.

L2TP

C.

PPTP

D.

IPsec