Which model describes relationships between assets within an industrial automation and control system?
In a defense-in-depth strategy, what is the purpose of role-based access control?
Available Choices (select all choices that are correct)
What is the purpose of ISO/IEC 15408 (Common Criteria)?
Available Choices (select all choices that are correct)
Which of the following is an element of monitoring and improving a CSMS?
Available Choices (select all choices that are correct)
What are the four main categories for documents in the ISA-62443 (IEC 62443) series?
Available Choices (select all choices that are correct)
Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?
Available Choices (select all choices that are correct)
In what step of the development process of the CSMS is “Establish purpose, organizational support, resources, and scope†taken care of?
Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?
Available Choices (select all choices that are correct)
Which steps are part of implementing countermeasures?
Available Choices (select all choices that are correct)
Which part of the standard provides a list of possible Foundational Requirements to address assessed risks?
Which is the BEST deployment system for malicious code protection?
Available Choices (select all choices that are correct)
Which is the PRIMARY objective when defining a security zone?
Available Choices (select all choices that are correct)
Which of the following is an example of separation of duties as a part of system development and maintenance?
Available Choices (select all choices that are correct)
Which is a commonly used protocol for managing secure data transmission on the Internet?
Available Choices (select all choices that are correct)
In which layer is the physical address assigned?
Available Choices (select all choices that are correct)
Which layer specifies the rules for Modbus Application Protocol
Available Choices (select all choices that are correct)
Which of the following can be employed as a barrier device in a segmented network?
Available Choices (select all choices that are correct)
Which policies and procedures publication is titled Patch Manaqement in the IACS Environment?
Available Choices (select all choices that are correct)
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
Authorization (user accounts) must be granted based on which of the following?
Available Choices (select all choices that are correct)
Electronic security, as defined in ANSI/ISA-99.00.01:2007. includes which of the following?
Available Choices (select all choices that are correct)
After receiving an approved patch from the JACS vendor, what is BEST practice for the asset owner to follow?
The Risk Analysis category contains background information that is used where?
Available Choices (select all choices that are correct)
Which of the following tools has the potential for serious disruption of a control network and should not be used on a live system?
Available Choices (select all choices that are correct)
As related to technical security requirements for IACS components, what does CCSC stand for?
Which of the following protocols is mentioned as being commonly used in control systems?
Which communications system covers a large geographic area?
Available Choices (select all choices that are correct)
Which of the following starts at a high level and includes all ANSI/ISA-95 Level 0,1,2,3,4 equipment and information systems?
Which is a role of the application layer?
Available Choices (select all choices that are correct)
Which U.S. Department is responsible for the Chemical Facility Anti-Terrorism Standards (CFATS)?
Security Levels (SLs) are broken down into which three types?
Available Choices (select all choices that are correct)
Who must be included in a training and security awareness program?
Available Choices (select all choices that are correct)
Which standard is recognized as part of the NIST CSF Informative References?
What is a feature of an asymmetric key?
Available Choices (select all choices that are correct)