Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISA ISA-IEC-62443 - ISA/IEC 62443 Cybersecurity Fundamentals Specialist

Page: 1 / 5
Total 151 questions

In which layer is the physical address assigned?

Available Choices (select all choices that are correct)

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 7

Which is a physical layer standard for serial communications between two or more devices?

Available Choices (select all choices that are correct)

A.

RS232

B.

RS235

C.

RS432

D.

RS435

What is the primary audience for Part 2-5 of the ISA/IEC 62443 Series - Policies & Procedures group of standards?

A.

Asset owners

B.

Service providers

C.

Product suppliers

D.

System integrators

What is one of the primary causes of cyber-related production losses in process control systems?

A.

Human error

B.

Hardware failure

C.

Malware incidents

D.

Network congestion

Which of the following can be employed as a barrier device in a segmented network?

Available Choices (select all choices that are correct)

A.

Router

B.

Unmanaged switch

C.

VPN

D.

Domain controller

As related to IACS Maintenance Service Providers, when do maintenance activities generally start?

A.

During the design phase

B.

At the beginning of the project

C.

After the handover of the solution

D.

Before the handover of the solution

Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?

Available Choices (select all choices that are correct)

A.

Forwards packets, including routing through intermediate routers

B.

Gives transparent transfer of data between end users

C.

Provides the rules for framing, converting electrical signals to data

D.

Handles the physics of getting a message from one device to another

Which layer deals with data format conversion and encryption?

A.

Session

B.

Data link

C.

Application

D.

Presentation

What type of security level defines what a component or system is capable of meeting?

Available Choices (select all choices that are correct)

A.

Capability security level

B.

Achieved security level

C.

Design security level

D.

Target security level

What is the primary purpose of the NIST Cybersecurity Framework (CSF)?

A.

To create new cybersecurity technologies

B.

To replace existing cybersecurity standards

C.

To enhance the resilience of critical infrastructure

D.

To provide a certification program for organizations