Whose responsibility is it to determine the level of risk an organization is willing to tolerate?
Available Choices (select all choices that are correct)
Which part of the ISA/IEC 62443 series describes a methodology to develop quantitative metrics?
Which is a role of the application layer?
Available Choices (select all choices that are correct)
How does ISA-62443-2-1 suggest integrating the IACS Security Program (SP) within an organization?
Which of the following is an industry sector-specific standard?
Available Choices (select all choices that are correct)
Which is a commonly used protocol for managing secure data transmission on the Internet?
Available Choices (select all choices that are correct)
What are the three main components of the ISASecure Integrated Threat Analysis (ITA) Program?
Available Choices (select all choices that are correct)
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
Which is the PRIMARY objective when defining a security zone?
Available Choices (select all choices that are correct)
Why is OPC Classic considered firewall unfriendly?
Available Choices (select all choices that are correct)
Which type of cryptographic algorithms requires more than one key?
Available Choices (select all choices that are correct)
If a system integrator is designing zones and conduits for an IACS network based on risk assessments, which part of the ISA/IEC 62443 standard guides this process?
Which factor drives the selection of countermeasures?
Available Choices (select all choices that are correct)
Which standard is recognized as part of the NIST CSF Informative References?
What are the connections between security zones called?
Available Choices (select all choices that are correct)
Which is an important difference between IT systems and IACS?
Available Choices (select all choices that are correct)
A company manufactures embedded devices and network components used in control systems but does not participate in on-site installation or maintenance. What role do they fulfill?
Which of the following is the BEST reason for periodic audits?
Available Choices (select all choices that are correct)
Which of the following is a cause for the increase in attacks on IACS?
Available Choices (select all choices that are correct)
At Layer 4 of the Open Systems Interconnection (OSI) model, what identifies the application that will handle a packet inside a host?
Available Choices (select all choices that are correct)
Using the risk matrix below, what is the risk of a medium likelihood event with high consequence?
When selecting a risk assessment methodology for a complex industrial automation system, which approach aligns BEST with ISA/IEC 62443 guidance?
How many maturity levels (ML) are established for evaluation criteria according to ISA/IEC 62443-2-4?
What is one of the primary causes of cyber-related production losses in process control systems?
According to the scheme for cybersecurity profiles, which of the following is true about ISA/IEC 62443 security requirements when creating a security profile?
What is a key aspect of the relationship between physical security measures and cybersecurity?
Which organization manages the ISASecure conformance certification program?
Available Choices (select all choices that are correct)
Which Security Level (SL) would be MOST appropriate for a system that requires protection against attackers with high motivation and extended resources using sophisticated means?
What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?
What is the definition of "defense in depth" when referring to cybersecurity?
Which of the following is a recommended default rule for IACS firewalls?
Available Choices (select all choices that are correct)
What are the four documents that belong to the General category of the ISA-62443 (IEC 62443) series?
What programs are MOST effective if they are tailored to the audience, consistent with company policy, and communicated regularly?
If an industrial control system experiences frequent unexpected shutdowns causing downtime, which SP Element activities should be reviewed to improve system availability?
What change was introduced in the second edition (2024) of ISA-62443-2-1 compared to the first edition (2010)?
Which of the following is an example of a device used for intrusion detection?
A multinational corporation needs to implement a cybersecurity framework that can be adapted across different countries and industries while allowing continuous improvement. Which feature of the NIST CSF makes it suitable for this purpose?
After receiving an approved patch from the IACS vendor, what is BEST practice for the asset owner to follow?
Which of the ISA 62443 standards focuses on the process of developing secure products?
Available Choices (select all choices that are correct)
What caution is advised when using the vector approach to security levels?
As related to technical security requirements for IACS components, what does CCSC stand for?
What type of malware disrupted an emergency shutdown capability in safety systems?
Which is a PRIMARY reason why network security is important in IACS environments?
Available Choices (select all choices that are correct)
To which category of the ISA-62443 (IEC 62443) series does the document titled "Patch management in the IACS environment" belong?