Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISA ISA-IEC-62443 - ISA/IEC 62443 Cybersecurity Fundamentals Specialist

Page: 1 / 7
Total 227 questions

What is the FIRST step required in implementing ISO 27001?

Available Choices (select all choices that are correct)

A.

Create a security management organization.

B.

Define an information security policy.

C.

Implement strict security controls.

D.

Perform a security risk assessment.

An energy utility company needs to implement cybersecurity controls specifically tailored for industrial control systems. Which standard from the list would be MOST appropriate for their use?

A.

IEC PAS

B.

ISO/IEC 27001

C.

ISO/IEC 27019

D.

NIST SP 800-53

Which U.S. Department is responsible for the Chemical Facility Anti-Terrorism Standards (CFATS)?

A.

Department of Energy

B.

Nuclear Regulatory Commission

C.

Department of Homeland Security

D.

Transportation Security Administration

As related to IACS Maintenance Service Providers, when do maintenance activities generally start?

A.

During the design phase

B.

At the beginning of the project

C.

After the handover of the solution

D.

Before the handover of the solution

Which of the following is a recommended default rule for IACS firewalls?

Available Choices (select all choices that are correct)

A.

Allow all traffic by default.

B.

Allow IACS devices to access the Internet.

C.

Allow traffic directly from the IACS network to the enterprise network.

D.

Block all traffic by default.

Why were PLCs originally designed?

A.

To replace relays

B.

To service I/O exclusively

C.

To enhance network security

D.

To improve Ethernet functionality

According to the scheme for cybersecurity profiles, which of the following is true about ISA/IEC 62443 security requirements when creating a security profile?

A.

New security requirements can be added freely.

B.

Only foundational requirements can be changed.

C.

No new requirements are added and existing ones are not modified.

D.

Existing security requirements can be modified to fit sector needs.

Which layer deals with data format conversion and encryption?

A.

Session

B.

Data link

C.

Application

D.

Presentation

Which layer specifies the rules for Modbus Application Protocol

Available Choices (select all choices that are correct)

A.

Data link layer

B.

Session layer

C.

Presentation layer

D.

Application layer

What are the two sublayers of Layer 2?

Available Choices (select all choices that are correct)

A.

HIDS and NIDS

B.

LLC and MAC

C.

OPC and DCOM

D.

VLAN and VPN