Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ISA > Cybersecurity > ISA-IEC-62443

ISA-IEC-62443 ISA/IEC 62443 Cybersecurity Fundamentals Specialist Question and Answers

Question # 4

What does Layer 1 of the ISO/OSI protocol stack provide?

Available Choices (select all choices that are correct)

A.

Data encryption, routing, and end-to-end connectivity

B.

Framing, converting electrical signals to data, and error checking

C.

The electrical and physical specifications of the data connection

D.

User applications specific to network applications such as reading data registers in a PLC

Full Access
Question # 5

What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?

A.

Control

B.

Protocol

C.

Transport

D.

User

Full Access
Question # 6

Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?

Available Choices (select all choices that are correct)

A.

Forwards packets, including routing through intermediate routers

B.

Gives transparent transfer of data between end users

C.

Provides the rules for framing, converting electrical signals to data

D.

Handles the physics of getting a message from one device to another

Full Access
Question # 7

Security Levels (SLs) are broken down into which three types?

Available Choices (select all choices that are correct)

A.

SL-1, SL-2, and SL-3

B.

Target.capability, and achieved

C.

Target.capability, and availability

D.

Target.capacity, and achieved

Full Access
Question # 8

Which of the following is the underlying protocol for Ethernet/IP?

Available Choices (select all choices that are correct)

A.

Building Automation and Control Network (BACnet)

B.

Common Industrial Protocol

C.

Highway Addressable Remote Transducer (HART)

D.

Object Linking and Embedding (OLE) for Process Control

Full Access
Question # 9

After receiving an approved patch from the JACS vendor, what is BEST practice for the asset owner to follow?

A.

If a low priority, there is no need to apply the patch.

B.

If a medium priority, schedule the installation within three months after receipt.

C.

If a high priority, apply the patch at the first unscheduled outage.

D.

If no problems are experienced with the current IACS, it is not necessary to apply the patch.

Full Access
Question # 10

Which activity is part of establishing policy, organization, and awareness?

Available Choices (select all choices that are correct)

A.

Communicate policies.

B.

Establish the risk tolerance.

C.

Identify detailed vulnerabilities.

D.

Implement countermeasures.

Full Access
Question # 11

Which layer in the Open Systems Interconnection (OSI) model would include the use of the File Transfer Protocol (FTP)?

Available Choices (select all choices that are correct)

A.

Application layer

B.

Data link layer

C.

Session layer

D.

Transport layer

Full Access
Question # 12

What.are the two elements of the risk analysis category of an IACS?

Available Choices (select all choices that are correct)

A.

Risk evaluation and risk identification

B.

Business rationale and risk reduction and avoidance

C.

Business rationale and risk identification and classification

D.

Business recovery and risk elimination or mitigation

Full Access
Question # 13

Which policies and procedures publication is titled Patch Manaqement in the IACS Environment?

Available Choices (select all choices that are correct)

A.

ISA-TR62443-2-3

B.

ISA-TR62443-1-4

C.

ISA-62443-3-3

D.

ISA-62443-4-2

Full Access
Question # 14

Which analysis method is MOST frequently used as an input to a security risk assessment?

Available Choices (select all choices that are correct)

A.

Failure Mode and Effects Analysis

B.

Job Safety Analysis

C.

Process Hazard Analysis (PHA)

D.

System Safety Analysis(SSA)

Full Access
Question # 15

Which is the BEST deployment system for malicious code protection?

Available Choices (select all choices that are correct)

A.

Network segmentation

B.

IACS protocol converters

C.

Application whitelistinq (AWL) OD.

D.

Zones and conduits

Full Access
Question # 16

Safety management staff are stakeholders of what security program development?

Available Choices (select all choices that are correct)

A.

CSMS

B.

SPRP

C.

CSA

D.

ERM

Full Access
Question # 17

Authorization (user accounts) must be granted based on which of the following?

Available Choices (select all choices that are correct)

A.

Individual preferences

B.

Common needs for large groups

C.

Specific roles

D.

System complexity

Full Access
Question # 18

What are the four main categories for documents in the ISA-62443 (IEC 62443) series?

Available Choices (select all choices that are correct)

A.

General. Policies and Procedures. System, and Component

B.

End-User, Integrator, Vendor, and Regulator

C.

Assessment. Mitigation. Documentation, and Maintenance

D.

People. Processes. Technology, and Training

Full Access
Question # 19

Which layer specifies the rules for Modbus Application Protocol

Available Choices (select all choices that are correct)

A.

Data link layer

B.

Session layer

C.

Presentation layer

D.

Application layer

Full Access
Question # 20

Which factor drives the selection of countermeasures?

Available Choices (select all choices that are correct)

A.

Foundational requirements

B.

Output from a risk assessment

C.

Security levels

D.

System design

Full Access
Question # 21

Which statement is TRUE regarding Intrusion Detection Systems (IDS)?

Available Choices (select all choices that are correct)

A.

Modern IDS recognize IACS devices by default.

B.

They are very inexpensive to design and deploy.

C.

They are effective against known vulnerabilities.

D.

They require a small amount of care and feeding

Full Access
Question # 22

Which of the following is a recommended default rule for IACS firewalls?

Available Choices (select all choices that are correct)

A.

Allow all traffic by default.

B.

Allow IACS devices to access the Internet.

C.

Allow traffic directly from the IACS network to the enterprise network.

D.

Block all traffic by default.

Full Access
Question # 23

Which of the following attacks relies on a human weakness to succeed?

Available Choices (select all choices that are correct)

A.

Denial-of-service

B.

Phishing

C.

Escalation-of-privileges

D.

Spoofing

Full Access
Question # 24

Which communications system covers a large geographic area?

Available Choices (select all choices that are correct)

A.

Campus Area Network (CAN)

B.

Local Area Network (LAN)

C.

Storage Area Network

D.

Wide Area Network (WAN)

Full Access
Question # 25

Within the National Institute of Standards and Technoloqv Cybersecuritv Framework v1.0 (NIST CSF), what is the status of the ISA 62443 standards?

Available Choices (select all choices that are correct)

A.

They are used as informative references.

B.

They are used as normative references.

C.

They are under consideration for future use.

D.

They are not used.

Full Access
Question # 26

Which organization manages the ISASecure conformance certification program?

Available Choices (select all choices that are correct)

A.

American Society for Industrial Security

B.

Automation Federation

C.

National Institute of Standards and Technology

D.

Security Compliance Institute

Full Access