Which communications system covers a large geographic area?
Which communications system covers a large geographic area? Available Choices (select all choices that are correct)A . Campus Area Network (CAN) B. Local Area Network (LAN) C. Storage Area Network D. Wide Area Network (WAN)View AnswerAnswer: D
What does the abbreviation CSMS round in ISA 62443-2-1 represent?
What does the abbreviation CSMS round in ISA 62443-2-1 represent? Available Choices (select all choices that are correct)A . Control System Management System B. Control System Monitoring System C. Cyber Security Management System D. Cyber Security Monitoring SystemView AnswerAnswer: C
Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?
Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements? Available Choices (select all choices that are correct)A . Aligned development process B. Aligned needs of industrial users C. Well-documented security policies and procedures D. Defense-in-depth approach to designingView AnswerAnswer: D
Which of the following is an element of monitoring and improving a CSMS?
Which of the following is an element of monitoring and improving a CSMS? Available Choices (select all choices that are correct)A . Increase in staff training and security awareness B. Restricted access to the industrial control system to an as-needed basis C. Significant changes in identified risk round in periodic...
Which activity is part of establishing policy, organization, and awareness?
Which activity is part of establishing policy, organization, and awareness? Available Choices (select all choices that are correct)A . Communicate policies. B. Establish the risk tolerance. C. Identify detailed vulnerabilities. D. Implement countermeasures.View AnswerAnswer: A,B
What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?
What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below? A . Control B. Protocol C. Transport D. UserView AnswerAnswer: C
Which analysis method is MOST frequently used as an input to a security risk assessment?
Which analysis method is MOST frequently used as an input to a security risk assessment? Available Choices (select all choices that are correct)A . Failure Mode and Effects Analysis B. Job Safety Analysis C. Process Hazard Analysis (PHA) D. System Safety Analysis(SSA)View AnswerAnswer: C
Authorization (user accounts) must be granted based on which of the following?
Authorization (user accounts) must be granted based on which of the following? Available Choices (select all choices that are correct)A . Individual preferences B. Common needs for large groups C. Specific roles D. System complexityView AnswerAnswer: C
Which layer in the Open Systems Interconnection (OSI) model would include the use of the File Transfer Protocol (FTP)?
Which layer in the Open Systems Interconnection (OSI) model would include the use of the File Transfer Protocol (FTP)? Available Choices (select all choices that are correct)A . Application layer B. Data link layer C. Session layer D. Transport layerView AnswerAnswer: A
Which is an important difference between IT systems and IACS?
Which is an important difference between IT systems and IACS? Available Choices (select all choices that are correct)A . The IACS security priority is integrity. B. The IT security priority is availability. C. IACS cybersecurity must address safety issues. D. Routers are not used in IACS networks.View AnswerAnswer: A,C