What does Layer 1 of the ISO/OSI protocol stack provide?
Available Choices (select all choices that are correct)
Data encryption, routing, and end-to-end connectivity
Framing, converting electrical signals to data, and error checking
The electrical and physical specifications of the data connection
User applications specific to network applications such as reading data registers in a PLC
 Layer 1 of the ISO/OSI protocol stack is the physical layer, which provides the means of transmitting and receiving raw data bits over a physical medium. It defines the electrical and physical specifications of the data connection, such as the voltage levels, signal timing, cable types, connectors, and pin assignments. It does not perform any data encryption, routing, end-to-end connectivity, framing, error checking, or user applications. These functions are performed by higher layers of the protocol stack, such as the data link layer, the network layer, the transport layer, and the application layer. References: ISO/IEC 7498-1:1994, Section 6.11; ISA/IEC 62443 Cybersecurity Fundamentals Specialist Study Guide, Section 3.1.12
What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?
Control
Protocol
Transport
User
The Open Systems Interconnection (OSI) model is a framework that describes the functions of a networking system. The OSI model categorizes the computing functions of the different network components, outlining the rules and requirement needed to support the interoperability of the software and hardware that make up the network1.
The OSI model consists of seven abstraction layers arranged in a top-down order: Physical, Data Link, Network, Transport, Session, Presentation, and Application. The Transport layer is the fourth layer in the OSI model, and it is responsible for ensuring reliable and efficient data transfer between the Network layer and the Session layer2. The Transport layer uses protocols such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) to provide end-to-end communication services, such as error detection and correction, flow control, congestion control, and segmentation2.
The image that you sent shows a 3D representation of the OSI model, with the layers stacked on top of each other. The missing layer is the Transport layer, which isrepresented by a pink box with a white arrow pointing to it. The arrow is labeled “TCP, UDPâ€.
1: What is the OSI Model? 7 Network Layers Explained | Fortinet 2: What is OSI Model | 7 Layers Explained - GeeksforGeeks
Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?
Available Choices (select all choices that are correct)
Forwards packets, including routing through intermediate routers
Gives transparent transfer of data between end users
Provides the rules for framing, converting electrical signals to data
Handles the physics of getting a message from one device to another
The primary responsibility of the network layer of the Open Systems Interconnection (OSI) model is to forward packets, including routing through intermediate routers. The network layer is the third layer from the bottom of the OSI model, and it is responsible for maintaining the quality of the data and passing and transmitting it from its source to its destination. The network layer also assigns logical addresses to devices, such as IP addresses, and uses various routing algorithms to determine the best path for the packets to travel. The network layer operates on packets, which are units of data that contain the source and destination addresses, as well as the payload. The network layer forwards packets from one node to another, using routers to switch packets between different networks. The network layer also handles host-to-host delivery, which means that it ensures that the packets reach the correct destination host.
The other choices are not correct because:
References:
Security Levels (SLs) are broken down into which three types?
Available Choices (select all choices that are correct)
SL-1, SL-2, and SL-3
Target.capability, and achieved
Target.capability, and availability
Target.capacity, and achieved
Security Levels (SLs) are a way of expressing the security performance of an industrial automation and control system (IACS) or its components. SLs are broken down into three types: target, capability, and achieved1.
References:Â ISA/IEC 62443 Standards to Secure Your Industrial Control System, page 3-4.
Which of the following is the underlying protocol for Ethernet/IP?
Available Choices (select all choices that are correct)
Building Automation and Control Network (BACnet)
Common Industrial Protocol
Highway Addressable Remote Transducer (HART)
Object Linking and Embedding (OLE) for Process Control
Ethernet/IP is an industrial network protocol that adapts the Common Industrial Protocol (CIP) to standard Ethernet. CIP is an object-oriented protocol that provides a unified communication architecture for various industrial automation applications, such as control, safety, security, energy, synchronization and motion, information and network management. CIP defines a set of messages and services for interacting with devices and data on the network, as well as a set of device profiles for consistent implementation of automation functions across different products. Ethernet/IP uses the transport and control protocols of standard Ethernet, such as TCP/IP and IEEE 802.3, to define the features and functions for its lower layers. Ethernet/IP also uses UDP to transport I/O messages and supports various network topologies, such as star, linear, ring and wireless. Ethernet/IP is one of the leading industrial protocols in the United States and is widely used in a range of industries, such as factory, hybrid and process. Ethernet/IP is managed by ODVA, Inc., a global trade and standards development organization. References:
After receiving an approved patch from the JACS vendor, what is BEST practice for the asset owner to follow?
If a low priority, there is no need to apply the patch.
If a medium priority, schedule the installation within three months after receipt.
If a high priority, apply the patch at the first unscheduled outage.
If no problems are experienced with the current IACS, it is not necessary to apply the patch.
 According to the ISA/IEC 62443 Cybersecurity Fundamentals Specialist resources, patches are software updates that fix bugs, vulnerabilities, or improve performance of a system. Patches are classified into three categories based on their urgency and impact: low, medium, and high. Low priority patches are those that have minimal or no impact on the system functionality or security, and can be applied at the next scheduled maintenance. Medium priority patches are those that have moderate impact on the system functionality or security, and should be applied within a reasonable time frame, such as three months. High priority patches are those that have significant or critical impact on the system functionality or security, and should be applied as soon as possible, preferably at the first unscheduled outage. Applying patches in a timely manner is a best practice for maintaining the security and reliability of an industrial automation and control system (IACS). References:
Which activity is part of establishing policy, organization, and awareness?
Available Choices (select all choices that are correct)
Communicate policies.
Establish the risk tolerance.
Identify detailed vulnerabilities.
Implement countermeasures.
 According to the ISA/IEC 62443 Cybersecurity Fundamentals Specialist course, establishing policy, organization, and awareness is one of the four steps of the IACS cybersecurity lifecycle. This step involves defining the cybersecurity policies, roles, and responsibilities, as well as communicating them to the relevant stakeholders. It also involves establishing the risk tolerance level, which is the acceptable level of risk for the organization. Communicating policies and establishing the risk tolerance are both activities that are part of this step. Identifying detailed vulnerabilities and implementing countermeasures are activities that belong to the next steps of the lifecycle, which are assessing the current situation and implementing the cybersecurity program, respectively. References: ISA/IEC 62443 Cybersecurity Fundamentals Specialist course, Module 2: IACS Cybersecurity Lifecycle1
Which layer in the Open Systems Interconnection (OSI) model would include the use of the File Transfer Protocol (FTP)?
Available Choices (select all choices that are correct)
Application layer
Data link layer
Session layer
Transport layer
The File Transfer Protocol (FTP) is an application layer protocol that moves files between local and remote file systems. It runs on top of TCP, like HTTP. To transfer a file, 2 TCP connections are used by FTP in parallel: control connection and data connection. The control connection is used to send commands and responses between the client and the server, while the data connection is used to transfer the actual file. FTP is one of the standard communication protocols defined by the TCP/IP model and it does not fit neatly into the OSI model. However, since the OSI model is a reference model that describes the general functions of each layer, FTP can be considered as an application layer protocol in the OSI model, as it provides user services and interfaces to the network. The application layer is the highest layer in the OSI model and it is responsible for providing various network services to the users, such as email, web browsing, file transfer, remote login, etc. The application layer interacts with the presentation layer, which is responsible for data formatting, encryption, compression, etc. The presentation layer interacts with the session layer, which is responsible for establishing, maintaining, and terminating sessions between applications. The session layer interacts with the transport layer, which is responsible for reliable end-to-end data transfer and flow control. The transport layer interacts with the network layer, which is responsible for routing and addressing packets across different networks. The network layer interacts with the data link layer, which is responsible for framing, error detection, and medium access control. The data link layer interacts with the physical layer, which is responsible for transmitting and receiving bits over the physical medium. References:
What.are the two elements of the risk analysis category of an IACS?
Available Choices (select all choices that are correct)
Risk evaluation and risk identification
Business rationale and risk reduction and avoidance
Business rationale and risk identification and classification
Business recovery and risk elimination or mitigation
 The risk analysis category of an IACS consists of two elements: business rationale and risk identification and classification1. Business rationale is the process of defining the scope, objectives, and criteria for the risk analysis, as well as the roles and responsibilities of the stakeholders involved. Risk identification and classification is the process of identifying the assets, threats, vulnerabilities, and consequences of a cyberattack on the IACS, and assigning a risk level to each scenario based on the likelihood and impact of the attack1. These elements are essential for establishing a baseline of the current risk posture of the IACS and determining the appropriate risk treatment measures to reduce the risk to an acceptable level. References: 1: ISA/IEC 62443-3-2:2020, Security for industrial automation and control systems - Part 3-2: Security risk assessment for system design, International Society of Automation, Research Triangle Park, NC, USA, 2020.
Which policies and procedures publication is titled Patch Manaqement in the IACS Environment?
Available Choices (select all choices that are correct)
ISA-TR62443-2-3
ISA-TR62443-1-4
ISA-62443-3-3
ISA-62443-4-2
 ISA-TR62443-2-3 is the technical report that describes the requirements for asset owners and industrial automation and control system (IACS) product suppliers that have established and are now maintaining an IACS patch management program. Patch management is the process of applying software updates to fix vulnerabilities, bugs, or performance issues in the IACS components. Patch management is an essential part of maintaining the security and reliability of the IACS environment. The technical report provides guidance on how to establish a patch management policy, how to assess the impact and risk of patches, how to test and deploy patches, and how to monitor and audit the patch management process. References: 1, 2, 3
Which analysis method is MOST frequently used as an input to a security risk assessment?
Available Choices (select all choices that are correct)
Failure Mode and Effects Analysis
Job Safety Analysis
Process Hazard Analysis (PHA)
System Safety Analysis(SSA)
A Process Hazard Analysis (PHA) is a systematic method of identifying and evaluating the potential hazards associated with an industrial process. A PHA can help to identify the sources of cyber threats, the consequences of cyber incidents, and the existing safeguards and mitigation measures. A PHA is most frequently used as an input to a security risk assessment because it provides a comprehensive and structured overview of the process and its risks, which can then be used to determine the security level targets and security countermeasures for the industrial automation and control system (IACS). A PHA can also help to align the security objectives with the safety objectives of the process, and to ensure that the security measures do not compromise the safety or operability of the process. References:
Which is the BEST deployment system for malicious code protection?
Available Choices (select all choices that are correct)
Network segmentation
IACS protocol converters
Application whitelistinq (AWL) OD.
Zones and conduits
Application whitelisting (AWL) is a technique that allows only authorized applications to run on a system, and blocks any unauthorized or malicious code from executing. AWL is one of the most effective methods for preventing malware infections and reducing the attack surface of a system. AWL can be implemented at different levels, such as the operating system, the network, or the application itself. AWL is especially useful forindustrial automation and control systems (IACS), which often run on legacy or proprietary platforms that are not compatible with traditional antivirus software or other security solutions. AWL can also help protect IACS from zero-day attacks, which exploit unknown vulnerabilities that have not been patched or detected by security vendors. AWL is recommended by the ISA/IEC 62443 standards as a key component of malicious code protection for IACS. According to the standards, AWL should be applied to all IACS components that support it, and should be configured and maintained according to the security policies and procedures of the organization. AWL should also be complemented by other security measures, such as network segmentation, zones and conduits, and patch management, to provide a defense-in-depth approach to IACS security. References:
Safety management staff are stakeholders of what security program development?
Available Choices (select all choices that are correct)
CSMS
SPRP
CSA
ERM
 Safety management staff are stakeholders of the CSMS, which stands for Cybersecurity Management System. The CSMS is a framework for managing the cybersecurity of industrial automation and control systems (IACS) based on the ISA/IEC 62443-2-1 standard1. The CSMS defines the objectives, policies, metrics, and governance for the overall ICS security program2. The CSMS also includes the processes for risk assessment, security design, implementation, monitoring, and improvement3. Safety management staff are involved in the CSMS development and implementation, as they are responsible for ensuring the safety of the IACS and the people, environment, and assets that depend on it. Safety management staff need to coordinate with the security management staff to align the safety and security requirements, identify and mitigate the safety risks arising from cyber threats, and monitor and respond to safety incidents caused by cyberattacks. References:
Authorization (user accounts) must be granted based on which of the following?
Available Choices (select all choices that are correct)
Individual preferences
Common needs for large groups
Specific roles
System complexity
Authorization is the process of granting or denying access to a network resource or function. Authorization (user accounts) must be granted based on specific roles, which are defined as sets of permissions and responsibilities assigned to a user or a group of users. Roles should be based on the principle of least privilege, which means that users should only have the minimum level of access required to perform their tasks. Roles should also be based on the principle of separation of duties, which means that users should not have conflicting or overlapping responsibilities that could compromise the security or integrity of the system. Authorization based on individual preferences or common needs for large groups is not recommended, as it could lead to excessive or unnecessary access rights, or to inconsistent or conflicting policies. Authorization based on system complexity is also not a good criterion, as it could result in overcomplicated or unclear roles that are difficult to manage or audit. References:
What are the four main categories for documents in the ISA-62443 (IEC 62443) series?
Available Choices (select all choices that are correct)
General. Policies and Procedures. System, and Component
End-User, Integrator, Vendor, and Regulator
Assessment. Mitigation. Documentation, and Maintenance
People. Processes. Technology, and Training
 The ISA/IEC 62443 series of standards is organized into four main categories for documents, based on the topics and perspectives that they cover. These categories are: General, Policies and Procedures, System, and Component12.
The other options are not valid categories for documents in the ISA/IEC 62443 series of standards, as they either do not reflect the structure and scope of the standards, or they mix different aspects of IACS security that are covered by different categories. For example, end-user, integrator, vendor, and regulator are not categories for documents, but rather roles or stakeholders that are involved in IACS security. Assessment, mitigation, documentation, and maintenance are not categories for documents, but rather activities or phases that are part of the IACS security lifecycle. People, processes, technology, and training are not categories for documents, but rather elements or dimensions that are essential for IACS security.
References:
Which layer specifies the rules for Modbus Application Protocol
Available Choices (select all choices that are correct)
Data link layer
Session layer
Presentation layer
Application layer
The Modbus Application Protocol is a messaging protocol that provides client/server communication between devices connected on different types of buses or networks. It is positioned at level 7 of the OSI model, which is the application layer. The application layer is the highest level of the OSI model and defines the rules and formats for data exchange between applications. The Modbus Application Protocol is independent of the underlying communication layers and can be implemented using different transport protocols, such as TCP/IP, serial, or Modbus Plus. The Modbus Application Protocoldefines the function codes, data formats, and error codes for Modbus transactions123 References:
Which factor drives the selection of countermeasures?
Available Choices (select all choices that are correct)
Foundational requirements
Output from a risk assessment
Security levels
System design
The selection of countermeasures is driven by the output from a risk assessment, which identifies the risks and their associated likelihood and consequences for each zone and conduit in the industrial automation and control system (IACS). The risk assessment also determines the target security level (SL-T) for each zone and conduit, which represents the desired level of protection against the identified threats. The countermeasures are then selected based on the SL-T and the existing security level (SL-A) of the zone and conduit, as well as the cost and feasibility of implementation. The countermeasures should aim to reduce the risk to an acceptable level by increasing the SL-A to meet or exceed the SL-T. References: ISA/IEC 62443-3-2:2018 - Security risk assessment for system design, ISA/IEC 62443-3-3:2013 - System security requirements and security levels, ISA/IEC 62443 Cybersecurity Fundamentals Specialist Training Course
Which statement is TRUE regarding Intrusion Detection Systems (IDS)?
Available Choices (select all choices that are correct)
Modern IDS recognize IACS devices by default.
They are very inexpensive to design and deploy.
They are effective against known vulnerabilities.
They require a small amount of care and feeding
 Intrusion detection systems (IDS) are tools that monitor network traffic and detect suspicious or malicious activity based on predefined rules or signatures. They are effective against known vulnerabilities, as they can alert the system administrators or security personnel when they encounter a match with a known attack pattern or behavior. However, IDS have some limitations and challenges, especially when applied to industrial automation and control systems (IACS). Some of these are:
References: ISA/IEC 62443-2-1:2010 - Establishing an industrial automation and control system security program, ISA/IEC 62443-3-3:2013 - System security requirements and security levels, ISA/IEC 62443 Cybersecurity Fundamentals Specialist Training Course, [Enhancing Modbus/TCP-Based Industrial Automation and Control Systems Security Using Intrusion Detection Systems]
Which of the following is a recommended default rule for IACS firewalls?
Available Choices (select all choices that are correct)
Allow all traffic by default.
Allow IACS devices to access the Internet.
Allow traffic directly from the IACS network to the enterprise network.
Block all traffic by default.
 A recommended default rule for IACS firewalls is to block all traffic by default, and then allow only the necessary and authorized traffic based on the security policy and the zone and conduit model. This is also known as the principle of least privilege, which means granting the minimum access required for a legitimate purpose. Blocking all traffic by default provides a higher level of security and reduces the attack surface of the IACS network. The other choices are not recommended default rules for IACS firewalls, as they may expose the IACS network to unnecessary risks. Allowing all traffic by default would defeat the purpose of a firewall, as it would not filter any malicious or unwanted traffic. Allowing IACS devices to access the Internet would expose them to potential cyber threats, such as malware, phishing, or denial-of-service attacks. Allowing traffic directly from the IACS network to the enterprise network would bypass the demilitarized zone (DMZ), which is a buffer zone that isolates the IACS network from the enterprise network and hosts services that need to communicate between them. References:
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
Denial-of-service
Phishing
Escalation-of-privileges
Spoofing
Phishing is a type of cyberattack that relies on a human weakness to succeed. Phishing is the practice of sending fraudulent emails or other messages that appear to come from a legitimate source, such as a bank, a government agency, or a trusted person, in order to trick the recipient into revealing sensitive information, such as passwords, credit card numbers, or personal details, or into clicking on malicious links or attachments that may install malware or ransomware on their devices. Phishing is a common and effective way of compromising the security of industrial automation and control systems (IACS), as it can bypass technical security measures by exploiting the human factor. Phishing can also be used to gain access to the IACS network, to conduct reconnaissance, to launch further attacks, or to cause damage or disruption to the IACS operations. The ISA/IEC 62443 series of standards recognize phishing as a potential threat vector for IACS and provide guidance and best practices on how to prevent, detect, and respond to phishing attacks. Some of the recommended countermeasures include:
Which communications system covers a large geographic area?
Available Choices (select all choices that are correct)
Campus Area Network (CAN)
Local Area Network (LAN)
Storage Area Network
Wide Area Network (WAN)
A Wide Area Network (WAN) is a communications system that covers a large geographic area, such as a city, a country, or even several countries or continents1. WANs are often used to connect local area networks (LANs) and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations2. WANs use various communication infrastructures, such as public telephone lines, undersea cables, and communication satellites, to transmit data over long distances1. WANs are typically established with leased telecommunication circuits or less costly circuit switching or packet switching methods2. WANs are often built by Internet service providers, who provide connections from an organization’s LAN to the Internet2. The Internet itself may be considered a WAN2. References: Hardware and network technologies - CCEA LAN and WAN - BBC, Wide area network - Wikipedia.
Within the National Institute of Standards and Technoloqv Cybersecuritv Framework v1.0 (NIST CSF), what is the status of the ISA 62443 standards?
Available Choices (select all choices that are correct)
They are used as informative references.
They are used as normative references.
They are under consideration for future use.
They are not used.
The NIST CSF is a voluntary framework that provides a set of standards, guidelines, and best practices to help organizations manage cybersecurity risks. The NIST CSF consists of five core functions: Identify, Protect, Detect, Respond, and Recover. Each function is further divided into categories and subcategories that describe specific outcomes and activities. The NIST CSF also provides informative references that link the subcategories to existing standards, guidelines, and practices that can help organizations achieve the desired outcomes. The informative references are not mandatory or exhaustive, but rather serve as examples of possible sources of guidance. The ISA 62443 standards are used as informative references in the NIST CSF v1.0 for several subcategories, especially in the Protect and Detect functions. The ISA 62443 standards are a series of standards that provide a framework for securing industrial automation and control systems (IACS). The ISA 62443 standards cover various aspects of IACS security, such as terminology, concepts, requirements, policies, procedures, and technical specifications. The ISA 62443 standards are aligned with the NIST CSF in terms of the core functions and the risk-based approach. Therefore, the ISA 62443 standards can provide useful guidance and best practices for organizations that use IACS and want to implement the NIST CSF. References:
Which organization manages the ISASecure conformance certification program?
Available Choices (select all choices that are correct)
American Society for Industrial Security
Automation Federation
National Institute of Standards and Technology
Security Compliance Institute
 The ISASecure conformance certification program is managed by the Security Compliance Institute (ISCI), a non-profit organization established in 2007 by a group of industry stakeholders, including end users, suppliers, and integrators. ISCI’s mission is to provide a common industry-accepted set of device and process requirements that drive device security, simplifying procurement for asset owners and device assurance for equipment vendors12. References: 1: ISASecure - IEC 62443 Conformance Certification - Official Site 2: Certifications - ISASecure
TESTED 24 Nov 2024