How many element qroups are in the "Addressinq Risk" CSMS cateqorv?

How many element qroups are in the "Addressinq Risk" CSMS cateqorv? Available Choices (select all choices that are correct)A . 2 B. 3 C. 4 D. 5View AnswerAnswer: B

August 3, 2023 No Comments READ MORE +

Which of the following attacks relies on a human weakness to succeed?

Which of the following attacks relies on a human weakness to succeed? Available Choices (select all choices that are correct)A . Denial-of-service B. Phishing C. Escalation-of-privileges D. SpoofingView AnswerAnswer: B

August 2, 2023 No Comments READ MORE +

Security Levels (SLs) are broken down into which three types?

Security Levels (SLs) are broken down into which three types? Available Choices (select all choices that are correct)A . SL-1, SL-2, and SL-3 B. Target.capability, and achieved C. Target.capability, and availability D. Target.capacity, and achievedView AnswerAnswer: B

August 1, 2023 No Comments READ MORE +

Which is a PRIMARY reason why network security is important in IACS environments?

Which is a PRIMARY reason why network security is important in IACS environments? Available Choices (select all choices that are correct)A . PLCs are inherently unreliable. B. PLCs are programmed using ladder logic. C. PLCs use serial or Ethernet communications methods. D. PLCs under cyber attack can have costly and...

August 1, 2023 No Comments READ MORE +

Which of the following is an activity that should trigger a review of the CSMS?

Which of the following is an activity that should trigger a review of the CSMS? Available Choices (select all choices that are correct)A . Budgeting B. New technical controls C. Organizational restructuring D. Security incident exposing previously unknown risk.View AnswerAnswer: D

August 1, 2023 No Comments READ MORE +

Which of the following is a recommended default rule for IACS firewalls?

Which of the following is a recommended default rule for IACS firewalls? Available Choices (select all choices that are correct)A . Allow all traffic by default. B. Allow IACS devices to access the Internet. C. Allow traffic directly from the IACS network to the enterprise network. D. Block all traffic...

July 31, 2023 No Comments READ MORE +

What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?

What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)? Available Choices (select all choices that are correct)A . HTTPS B. IPSec C. MPLS D. SSHView AnswerAnswer: B

July 30, 2023 No Comments READ MORE +

Which is a physical layer standard for serial communications between two or more devices?

Which is a physical layer standard for serial communications between two or more devices? Available Choices (select all choices that are correct)A . RS232 B. RS235 C. RS432 D. RS435View AnswerAnswer: D

July 30, 2023 No Comments READ MORE +

Which activity is part of establishing policy, organization, and awareness?

Which activity is part of establishing policy, organization, and awareness? Available Choices (select all choices that are correct)A . Communicate policies. B. Establish the risk tolerance. C. Identify detailed vulnerabilities. D. Implement countermeasures.View AnswerAnswer: A

July 30, 2023 No Comments READ MORE +

What is OPC?

What is OPC? Available Choices (select all choices that are correct)A . An open standard protocol for real-time field bus communication between automation technology devices B. An open standard protocol for the communication of real-time data between devices from different manufacturers C. An open standard serial communications protocol widely used...

July 30, 2023 No Comments READ MORE +