Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISA ISA-IEC-62443 - ISA/IEC 62443 Cybersecurity Fundamentals Specialist

Page: 6 / 7
Total 227 questions

What does IACS stand for?

A.

Industrial Automation and Control Systems

B.

Industrial Associations and Control Systems

C.

Integrated Automation and Control Systems

D.

International Automated and Control Systems

Which of the following is the underlying protocol for Ethernet/IP?

Available Choices (select all choices that are correct)

A.

Building Automation and Control Network (BACnet)

B.

Common Industrial Protocol

C.

Highway Addressable Remote Transducer (HART)

D.

Object Linking and Embedding (OLE) for Process Control

According to ISA/IEC TR 62443-1-5, which documents can be referenced when creating a security profile?

A.

Only ISA/IEC 62443-3-3 and 4-1

B.

Only ISA/IEC 62443-1-1 and 1-2

C.

ISA/IEC 62443-2-1, 2-4, 3-3, 4-1, and 4-2

D.

Any cybersecurity standard outside the ISA/IEC 62443 series

Which statement BEST describes the Target Security Protection Ratings?

A.

They represent the actual security levels achieved at a time during operation.

B.

They measure the cost-effectiveness of security investments or implementation measures.

C.

They define the levels of security requirements fulfilled through implementation measures.

D.

They outline the desired levels of system security requirements to be fulfilled during operation.

If an asset owner wants to improve their organization’s ability to respond during a cyberattack, which of the following activities would be MOST appropriate to implement?

A.

Tabletop exercises

B.

Password hygiene campaign

C.

Architecture awareness workshops

D.

Anomaly detection drills for operators

In a defense-in-depth strategy, what is the purpose of role-based access control?

Available Choices (select all choices that are correct)

A.

Ensures that users can access systems from remote locations

B.

Ensures that users can access only certain devices on the network

C.

Ensures that users can access only the functions they need for their job

D.

Ensures that users correctly manage their username and password

What type of security level defines what a component or system is capable of meeting?

Available Choices (select all choices that are correct)

A.

Capability security level

B.

Achieved security level

C.

Design security level

D.

Target security level

What is recommended to use between the plant floor and the rest of the company networks?

A.

Hub

B.

Router

C.

Switch

D.

Firewall

Which steps are part of implementing countermeasures?

Available Choices (select all choices that are correct)

A.

Establish the risk tolerance and select common countermeasures.

B.

Establish the risk tolerance and update the business continuity plan.

C.

Select common countermeasures and update the business continuity plan.

D.

Select common countermeasures and collaborate with stakeholders.

Within the National Institute of Standards and Technoloqv Cybersecuritv Framework v1.0 (NIST CSF), what is the status of the ISA 62443 standards?

Available Choices (select all choices that are correct)

A.

They are used as informative references.

B.

They are used as normative references.

C.

They are under consideration for future use.

D.

They are not used.