Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISA ISA-IEC-62443 - ISA/IEC 62443 Cybersecurity Fundamentals Specialist

Page: 7 / 7
Total 227 questions

An industrial facility wants to ensure that only authorized communication reaches its PLCs while minimizing disruption to time-sensitive control processes. Which type of firewall would BEST suit this need?

A.

General-purpose software firewall

B.

Unidirectional gateway (data diode)

C.

IACS-specific firewall with deep packet inspection

D.

Basic packet filter firewall without protocol awareness

Which of the following is a cause for the increase in attacks on IACS?

Available Choices (select all choices that are correct)

A.

Use of proprietary communications protocols

B.

The move away from commercial off the shelf (COTS) systems, protocols, and networks

C.

Knowledge of exploits and tools readily available on the Internet

D.

Fewer personnel with system knowledge having access to IACS

What change was introduced in the second edition (2024) of ISA-62443-2-1 compared to the first edition (2010)?

A.

Introduction of a new PDCA cycle framework

B.

Elimination of duplication of ISMS requirements

C.

Removal of supply chain security considerations

D.

Focus only on individual system components rather than overall system

In an IACS system, a typical security conduit consists of which of the following assets?

A.

Controllers, sensors, transmitters, and final control elements

B.

Wiring, routers, switches, and network management devices

C.

Ferrous, thickwall, and threaded conduit including raceways

D.

Power lines, cabinet enclosures, and protective grounds

How does ISA-62443-2-1 suggest integrating the IACS Security Program (SP) within an organization?

A.

As a standalone system unrelated to other processes

B.

Outsourcing all security responsibilities to third parties

C.

By embedding it into organizational processes and the ISMS

D.

Only focusing on technical controls without process integration

What is a frequent mistake made with cybersecurity management?

A.

Ignoring organizational culture

B.

Focusing solely on technology solutions

C.

Implementing too many security practices at once

D.

Initially addressing smaller pieces of the entire system

To which category of the ISA-62443 (IEC 62443) series does the document titled “Patch management in the IACS environment” belong?

A.

System

B.

General

C.

Component

D.

Policies and Procedures

Multiuser accounts and shared passwords inherently carry which of the followinq risks?

Available Choices (select all choices that are correct)

A.

Privilege escalation

B.

Buffer overflow

C.

Unauthorized access

D.

Race conditions