11.11 Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which standard is recognized as part of the NIST CSF Informative References?

A.

COBIT 5

B.

PCI DSS

C.

ISO 9001

D.

ISA/IEC 62443

Which of the following is an example of separation of duties as a part of system development and maintenance?

Available Choices (select all choices that are correct)

A.

Changes are approved by one party and implemented by another.

B.

Configuration settings are made by one party and self-reviewed using a checklist.

C.

Developers write and then test their own code.

D.

Design and implementation are performed by the same team.

Which is NOT a potential consequence for organizations that fail to prioritize control system security?

A.

Personal injury

B.

Decreased energy consumption

C.

Unauthorized access, theft, or misuse of data

D.

Violation of legal and regulatory requirements

Which factor drives the selection of countermeasures?

Available Choices (select all choices that are correct)

A.

Foundational requirements

B.

Output from a risk assessment

C.

Security levels

D.

System design

Which standard is applied during the Assess phase for risk assessment?

A.

ISA/IEC 62443-2-1

B.

ISA/IEC 62443-3-1

C.

ISA/IEC 62443-3-2

D.

ISA/IEC 62443-3-3

What programs are MOST effective if they are tailored to the audience, consistent with company policy, and communicated regularly?

A.

CSMS development programs

B.

Cybersecurity awareness programs

C.

Control systems adjustment programs

D.

ISCS cybersecurity certification programs

Which is a PRIMARY reason why network security is important in IACS environments?

Available Choices (select all choices that are correct)

A.

PLCs are inherently unreliable.

B.

PLCs are programmed using ladder logic.

C.

PLCs use serial or Ethernet communications methods.

D.

PLCs under cyber attack can have costly and dangerous impacts.

Which of the following BEST describes a control system?

A.

Actions to prevent loss of revenue

B.

Unauthorized modifications to data

C.

Hardware and software components of an IACS

D.

Measures taken to protect against unauthorized access

Which service does an Intrusion Detection System (IDS) provide?

Available Choices (select all choices that are correct)

A.

It is the lock on the door for networks and computer systems.

B.

It is effective against all vulnerabilities in networks and computer systems.

C.

It blocks malicious activity in networks and computer systems.

D.

It detects attempts to break into or misuse a computer system.

Using the risk matrix below, what is the risk of a medium likelihood event with high consequence?

A.

Option A

B.

Option B

C.

Option C

D.

Option D