How many element qroups are in the "Addressinq Risk" CSMS cateqorv?
How many element qroups are in the "Addressinq Risk" CSMS cateqorv? Available Choices (select all choices that are correct)A . 2 B. 3 C. 4 D. 5View AnswerAnswer: B
Which of the following attacks relies on a human weakness to succeed?
Which of the following attacks relies on a human weakness to succeed? Available Choices (select all choices that are correct)A . Denial-of-service B. Phishing C. Escalation-of-privileges D. SpoofingView AnswerAnswer: B
Security Levels (SLs) are broken down into which three types?
Security Levels (SLs) are broken down into which three types? Available Choices (select all choices that are correct)A . SL-1, SL-2, and SL-3 B. Target.capability, and achieved C. Target.capability, and availability D. Target.capacity, and achievedView AnswerAnswer: B
Which is a PRIMARY reason why network security is important in IACS environments?
Which is a PRIMARY reason why network security is important in IACS environments? Available Choices (select all choices that are correct)A . PLCs are inherently unreliable. B. PLCs are programmed using ladder logic. C. PLCs use serial or Ethernet communications methods. D. PLCs under cyber attack can have costly and...
Which of the following is an activity that should trigger a review of the CSMS?
Which of the following is an activity that should trigger a review of the CSMS? Available Choices (select all choices that are correct)A . Budgeting B. New technical controls C. Organizational restructuring D. Security incident exposing previously unknown risk.View AnswerAnswer: D
Which of the following is a recommended default rule for IACS firewalls?
Which of the following is a recommended default rule for IACS firewalls? Available Choices (select all choices that are correct)A . Allow all traffic by default. B. Allow IACS devices to access the Internet. C. Allow traffic directly from the IACS network to the enterprise network. D. Block all traffic...
What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?
What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)? Available Choices (select all choices that are correct)A . HTTPS B. IPSec C. MPLS D. SSHView AnswerAnswer: B
Which is a physical layer standard for serial communications between two or more devices?
Which is a physical layer standard for serial communications between two or more devices? Available Choices (select all choices that are correct)A . RS232 B. RS235 C. RS432 D. RS435View AnswerAnswer: D
Which activity is part of establishing policy, organization, and awareness?
Which activity is part of establishing policy, organization, and awareness? Available Choices (select all choices that are correct)A . Communicate policies. B. Establish the risk tolerance. C. Identify detailed vulnerabilities. D. Implement countermeasures.View AnswerAnswer: A
What is OPC?
What is OPC? Available Choices (select all choices that are correct)A . An open standard protocol for real-time field bus communication between automation technology devices B. An open standard protocol for the communication of real-time data between devices from different manufacturers C. An open standard serial communications protocol widely used...