Which communications system covers a large geographic area?

Which communications system covers a large geographic area? Available Choices (select all choices that are correct)A . Campus Area Network (CAN) B. Local Area Network (LAN) C. Storage Area Network D. Wide Area Network (WAN)View AnswerAnswer: D

September 3, 2023 No Comments READ MORE +

What does the abbreviation CSMS round in ISA 62443-2-1 represent?

What does the abbreviation CSMS round in ISA 62443-2-1 represent? Available Choices (select all choices that are correct)A . Control System Management System B. Control System Monitoring System C. Cyber Security Management System D. Cyber Security Monitoring SystemView AnswerAnswer: C

September 3, 2023 No Comments READ MORE +

Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?

Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements? Available Choices (select all choices that are correct)A . Aligned development process B. Aligned needs of industrial users C. Well-documented security policies and procedures D. Defense-in-depth approach to designingView AnswerAnswer: D

September 3, 2023 No Comments READ MORE +

Which of the following is an element of monitoring and improving a CSMS?

Which of the following is an element of monitoring and improving a CSMS? Available Choices (select all choices that are correct)A . Increase in staff training and security awareness B. Restricted access to the industrial control system to an as-needed basis C. Significant changes in identified risk round in periodic...

September 2, 2023 No Comments READ MORE +

Which activity is part of establishing policy, organization, and awareness?

Which activity is part of establishing policy, organization, and awareness? Available Choices (select all choices that are correct)A . Communicate policies. B. Establish the risk tolerance. C. Identify detailed vulnerabilities. D. Implement countermeasures.View AnswerAnswer: A,B

September 2, 2023 No Comments READ MORE +

What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?

What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below? A . Control B. Protocol C. Transport D. UserView AnswerAnswer: C

September 2, 2023 No Comments READ MORE +

Which analysis method is MOST frequently used as an input to a security risk assessment?

Which analysis method is MOST frequently used as an input to a security risk assessment? Available Choices (select all choices that are correct)A . Failure Mode and Effects Analysis B. Job Safety Analysis C. Process Hazard Analysis (PHA) D. System Safety Analysis(SSA)View AnswerAnswer: C

September 1, 2023 No Comments READ MORE +

Authorization (user accounts) must be granted based on which of the following?

Authorization (user accounts) must be granted based on which of the following? Available Choices (select all choices that are correct)A . Individual preferences B. Common needs for large groups C. Specific roles D. System complexityView AnswerAnswer: C

August 31, 2023 No Comments READ MORE +

Which layer in the Open Systems Interconnection (OSI) model would include the use of the File Transfer Protocol (FTP)?

Which layer in the Open Systems Interconnection (OSI) model would include the use of the File Transfer Protocol (FTP)? Available Choices (select all choices that are correct)A . Application layer B. Data link layer C. Session layer D. Transport layerView AnswerAnswer: A

August 31, 2023 No Comments READ MORE +

Which is an important difference between IT systems and IACS?

Which is an important difference between IT systems and IACS? Available Choices (select all choices that are correct)A . The IACS security priority is integrity. B. The IT security priority is availability. C. IACS cybersecurity must address safety issues. D. Routers are not used in IACS networks.View AnswerAnswer: A,C

August 30, 2023 No Comments READ MORE +