Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > ISA > Cybersecurity > ISA-IEC-62443

ISA-IEC-62443 ISA/IEC 62443 Cybersecurity Fundamentals Specialist Question and Answers

Question # 4

Which model describes relationships between assets within an industrial automation and control system?

A.

Asset model

B.

Zone model

C.

Security level model

D.

Reference architecture

Full Access
Question # 5

How can Modbus be secured?

A.

By firewall

B.

By using a VPN

C.

By limiting user access

D.

By encrypting all data packets

Full Access
Question # 6

In a defense-in-depth strategy, what is the purpose of role-based access control?

Available Choices (select all choices that are correct)

A.

Ensures that users can access systems from remote locations

B.

Ensures that users can access only certain devices on the network

C.

Ensures that users can access only the functions they need for their job

D.

Ensures that users correctly manage their username and password

Full Access
Question # 7

What is the purpose of ISO/IEC 15408 (Common Criteria)?

Available Choices (select all choices that are correct)

A.

To define a security management organization

B.

To describe a process for risk management

C.

To define a product development evaluation methodology

D.

To describe what constitutes a secure product

Full Access
Question # 8

Which of the following is an element of monitoring and improving a CSMS?

Available Choices (select all choices that are correct)

A.

Increase in staff training and security awareness

B.

Restricted access to the industrial control system to an as-needed basis

C.

Significant changes in identified risk round in periodic reassessments

D.

Review of system logs and other key data files

Full Access
Question # 9

In the context of global frameworks, what does the acronym SDO stand for?

A.

Security Development Organization

B.

Software Development Organization

C.

Systematic Development Organization

D.

Standards Development Organization

Full Access
Question # 10

What are the four main categories for documents in the ISA-62443 (IEC 62443) series?

Available Choices (select all choices that are correct)

A.

General. Policies and Procedures. System, and Component

B.

End-User, Integrator, Vendor, and Regulator

C.

Assessment. Mitigation. Documentation, and Maintenance

D.

People. Processes. Technology, and Training

Full Access
Question # 11

Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?

Available Choices (select all choices that are correct)

A.

Aligned development process

B.

Aligned needs of industrial users

C.

Well-documented security policies and procedures

D.

Defense-in-depth approach to designing

Full Access
Question # 12

In what step of the development process of the CSMS is “Establish purpose, organizational support, resources, and scope” taken care of?

A.

Initiate the CSMS program.

B.

Conduct an initial/high-level risk assessment.

C.

Create reference architecture.

D.

Establish policy, organization, and awareness.

Full Access
Question # 13

Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?

Available Choices (select all choices that are correct)

A.

Forwards packets, including routing through intermediate routers

B.

Gives transparent transfer of data between end users

C.

Provides the rules for framing, converting electrical signals to data

D.

Handles the physics of getting a message from one device to another

Full Access
Question # 14

Which steps are part of implementing countermeasures?

Available Choices (select all choices that are correct)

A.

Establish the risk tolerance and select common countermeasures.

B.

Establish the risk tolerance and update the business continuity plan.

C.

Select common countermeasures and update the business continuity plan.

D.

Select common countermeasures and collaborate with stakeholders.

Full Access
Question # 15

Which part of the standard provides a list of possible Foundational Requirements to address assessed risks?

A.

ISA/IEC 62443-3-1

B.

ISA/IEC 62443-3-2

C.

ISA/IEC 62443-3-3

D.

ISA/IEC 62443-3-4

Full Access
Question # 16

Which is the BEST deployment system for malicious code protection?

Available Choices (select all choices that are correct)

A.

Network segmentation

B.

IACS protocol converters

C.

Application whitelistinq (AWL) OD.

D.

Zones and conduits

Full Access
Question # 17

Which of the following BEST describes a control system?

A.

Actions to prevent loss of revenue

B.

Unauthorized modifications to data

C.

Hardware and software components of an IACS

D.

Measures taken to protect against unauthorized access

Full Access
Question # 18

Which is the PRIMARY objective when defining a security zone?

Available Choices (select all choices that are correct)

A.

All assets in the zone must be from the same vendor.

B.

All assets in the zone must share the same security requirements.

C.

All assets in the zone must be at the same level in the Purdue model.

D.

All assets in the zone must be physically located in the same area.

Full Access
Question # 19

Which of the following is an example of separation of duties as a part of system development and maintenance?

Available Choices (select all choices that are correct)

A.

Changes are approved by one party and implemented by another.

B.

Configuration settings are made by one party and self-reviewed using a checklist.

C.

Developers write and then test their own code.

D.

Design and implementation are performed by the same team.

Full Access
Question # 20

Which is a commonly used protocol for managing secure data transmission on the Internet?

Available Choices (select all choices that are correct)

A.

Datagram Transport Layer Security (DTLS)

B.

Microsoft Point-to-Point Encryption

C.

Secure Telnet

D.

Secure Sockets Layer

Full Access
Question # 21

In which layer is the physical address assigned?

Available Choices (select all choices that are correct)

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 7

Full Access
Question # 22

Which layer specifies the rules for Modbus Application Protocol

Available Choices (select all choices that are correct)

A.

Data link layer

B.

Session layer

C.

Presentation layer

D.

Application layer

Full Access
Question # 23

What does the first group of the ISA/IEC 62443 series focus on?

A.

Policies and procedures

B.

System technology aspects

C.

General standards and reports

D.

Component security requirements

Full Access
Question # 24

Which of the following can be employed as a barrier device in a segmented network?

Available Choices (select all choices that are correct)

A.

Router

B.

Unmanaged switch

C.

VPN

D.

Domain controller

Full Access
Question # 25

Which policies and procedures publication is titled Patch Manaqement in the IACS Environment?

Available Choices (select all choices that are correct)

A.

ISA-TR62443-2-3

B.

ISA-TR62443-1-4

C.

ISA-62443-3-3

D.

ISA-62443-4-2

Full Access
Question # 26

Which of the following attacks relies on a human weakness to succeed?

Available Choices (select all choices that are correct)

A.

Denial-of-service

B.

Phishing

C.

Escalation-of-privileges

D.

Spoofing

Full Access
Question # 27

Authorization (user accounts) must be granted based on which of the following?

Available Choices (select all choices that are correct)

A.

Individual preferences

B.

Common needs for large groups

C.

Specific roles

D.

System complexity

Full Access
Question # 28

What does ISASecure primarily focus on?

A.

Developing internal testing labs

B.

Certifying IACS products and systems for cybersecurity

C.

Offering assessments for integrator site engineering practices

D.

Managing asset owner operations and maintenance practices

Full Access
Question # 29

Which standard is applied during the Assess phase for risk assessment?

A.

ISA/IEC 62443-2-1

B.

ISA/IEC 62443-3-1

C.

ISA/IEC 62443-3-2

D.

ISA/IEC 62443-3-3

Full Access
Question # 30

Electronic security, as defined in ANSI/ISA-99.00.01:2007. includes which of the following?

Available Choices (select all choices that are correct)

A.

Security guidelines for the proper configuration of IACS computers and operating systems

B.

Computers, networks, operating systems, applications, and other programmable configurable components of the system

C.

Personnel, policies, and procedures related to the security of computers, networks. PLCs, and other programmable configurable components of the system

D.

Security guidelines for the proper configuration of IACS PLCs and other programmable configurable components of the system

Full Access
Question # 31

After receiving an approved patch from the JACS vendor, what is BEST practice for the asset owner to follow?

A.

If a low priority, there is no need to apply the patch.

B.

If a medium priority, schedule the installation within three months after receipt.

C.

If a high priority, apply the patch at the first unscheduled outage.

D.

If no problems are experienced with the current IACS, it is not necessary to apply the patch.

Full Access
Question # 32

The Risk Analysis category contains background information that is used where?

Available Choices (select all choices that are correct)

A.

Many other elements in the CSMS

B.

(Elements external to the CSMS

C.

Only the Assessment element

D.

Only the Risk ID element

Full Access
Question # 33

Which of the following tools has the potential for serious disruption of a control network and should not be used on a live system?

Available Choices (select all choices that are correct)

A.

Remote desktop

B.

Vulnerability scanner

C.

FTP

D.

Web browser

Full Access
Question # 34

As related to technical security requirements for IACS components, what does CCSC stand for?

A.

Common Component Security Criteria

B.

Common Component Security Constraints

C.

Centralized Component Security Compliance

D.

Comprehensive Component Security Controls

Full Access
Question # 35

Which of the following protocols is mentioned as being commonly used in control systems?

A.

FTP

B.

HTTP

C.

SMTP

D.

Modbus TCP

Full Access
Question # 36

Which communications system covers a large geographic area?

Available Choices (select all choices that are correct)

A.

Campus Area Network (CAN)

B.

Local Area Network (LAN)

C.

Storage Area Network

D.

Wide Area Network (WAN)

Full Access
Question # 37

Which of the following starts at a high level and includes all ANSI/ISA-95 Level 0,1,2,3,4 equipment and information systems?

A.

Zone model

B.

Asset model

C.

Reference model

D.

Reference architecture

Full Access
Question # 38

Which is a role of the application layer?

Available Choices (select all choices that are correct)

A.

Includes protocols specific to network applications such as email, file transfer, and reading data registers in a PLC

B.

Includes user applications specific to network applications such as email, file transfer, and reading data registers in a PLC

C.

Provides the mechanism for opening, closing, and managing a session between end-user application processes

D.

Delivers and formats information, possibly with encryption and security

Full Access
Question # 39

Which U.S. Department is responsible for the Chemical Facility Anti-Terrorism Standards (CFATS)?

A.

Department of Energy

B.

Nuclear Regulatory Commission

C.

Department of Homeland Security

D.

Transportation Security Administration

Full Access
Question # 40

Security Levels (SLs) are broken down into which three types?

Available Choices (select all choices that are correct)

A.

SL-1, SL-2, and SL-3

B.

Target.capability, and achieved

C.

Target.capability, and availability

D.

Target.capacity, and achieved

Full Access
Question # 41

Who must be included in a training and security awareness program?

Available Choices (select all choices that are correct)

A.

Vendors and suppliers

B.

Employees

C.

All personnel

D.

Temporary staff

Full Access
Question # 42

What is the formula for calculating risk?

A.

Risk = Likelihood + Consequence

B.

Risk = Threat - Vulnerability * Consequence

C.

Risk = Threat + Vulnerability + Consequence

D.

Risk = Threat * Vulnerability * Consequence

Full Access
Question # 43

Which standard is recognized as part of the NIST CSF Informative References?

A.

COBIT 5

B.

PCI DSS

C.

ISO 9001

D.

ISA/IEC 62443

Full Access
Question # 44

What is a feature of an asymmetric key?

Available Choices (select all choices that are correct)

A.

Uses a continuous stream

B.

Uses different keys

C.

Shares the same key OD.

D.

Has lower network overhead

Full Access
Question # 45

Which organization is responsible for the ISA 62443 series of standards?

A.

American National Standards Institute (ANSI)

B.

International Electrotechnical Commission (IEC)

C.

National Institute of Standards and Technology (NIST)

D.

European Telecommunications Standards Institute (ETSI)

Full Access