Multiuser accounts and shared passwords inherently carry which of the followinq risks?
Available Choices (select all choices that are correct)
What is one of the primary causes of cyber-related production losses in process control systems?
Which of the following starts at a high level and includes all ANSI/ISA-95 Level 0,1,2,3,4 equipment and information systems?
Which policies and procedures publication is titled Patch Manaqement in the IACS Environment?
Available Choices (select all choices that are correct)
Which of the following refers to internal rules that govern how an organization protects critical system resources?
Available Choices (select all choices that are correct)
Which is the PRIMARY objective when defining a security zone?
Available Choices (select all choices that are correct)
Which is a role of the application layer?
Available Choices (select all choices that are correct)
What do packet filter firewalls examine?
Available Choices (select all choices that are correct)
Which of the following is a recommended default rule for IACS firewalls?
Available Choices (select all choices that are correct)
To which category of the ISA-62443 (IEC 62443) series does the document titled “Patch management in the IACS environment” belong?
Which is a commonly used protocol for managing secure data transmission on the Internet?
Available Choices (select all choices that are correct)
At Layer 4 of the Open Systems Interconnection (OSI) model, what identifies the application that will handle a packet inside a host?
Available Choices (select all choices that are correct)
Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?
Available Choices (select all choices that are correct)
Which of the following is an element of monitoring and improving a CSMS?
Available Choices (select all choices that are correct)
Which of the following is an example of separation of duties as a part of system development and maintenance?
Available Choices (select all choices that are correct)
What is the primary audience for Part 2-5 of the ISA/IEC 62443 Series - Policies & Procedures group of standards?
Which layer in the Open Systems Interconnection (OSI) model would include the use of the File Transfer Protocol (FTP)?
Available Choices (select all choices that are correct)
What are the connections between security zones called?
Available Choices (select all choices that are correct)
Safety management staff are stakeholders of what security program development?
Available Choices (select all choices that are correct)
Which is NOT a potential consequence for organizations that fail to prioritize control system security?
What is the primary goal of the Assess phase in the IACS Cybersecurity Lifecycle?
What is the name of the protocol that implements serial Modbus over Ethernet?
Available Choices (select all choices that are correct)
Which is a physical layer standard for serial communications between two or more devices?
Available Choices (select all choices that are correct)
Whose responsibility is it to determine the level of risk an organization is willing to tolerate?
Available Choices (select all choices that are correct)
Which analysis method is MOST frequently used as an input to a security risk assessment?
Available Choices (select all choices that are correct)
What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?
Which activity is part of establishing policy, organization, and awareness?
Available Choices (select all choices that are correct)
How should CSMS organizational responsibilities or training be handled over time?
What type of security level defines what a component or system is capable of meeting?
Available Choices (select all choices that are correct)
What is the purpose of ISO/IEC 15408 (Common Criteria)?
Available Choices (select all choices that are correct)
Which of the following staff is NOT mentioned as a stakeholder in the CSMS Program?
What does Layer 1 of the ISO/OSI protocol stack provide?
Available Choices (select all choices that are correct)
Which part of the ISA/IEC 62443 series describes a methodology to develop quantitative metrics?
Why is patch management more difficult for IACS than for business systems?
Available Choices (select all choices that are correct)
In a defense-in-depth strategy, what is the purpose of role-based access control?
Available Choices (select all choices that are correct)