Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What does Layer 1 of the ISO/OSI protocol stack provide?

Available Choices (select all choices that are correct)

A.

Data encryption, routing, and end-to-end connectivity

B.

Framing, converting electrical signals to data, and error checking

C.

The electrical and physical specifications of the data connection

D.

User applications specific to network applications such as reading data registers in a PLC

What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?

Available Choices (select all choices that are correct)

A.

HTTPS

B.

IPSec

C.

MPLS

D.

SSH

Which of the following is a trend that has caused a significant percentage of security vulnerabilities?

Available Choices (select all choices that are correct)

A.

IACS developing into a network of air-gapped systems

B.

IACS evolving into a number of closed proprietary systems

C.

IACS using equipment designed for measurement and control

D.

IACS becoming integrated with business and enterprise systems

What does a demilitarized zone (DMZ) provide in network security?

A.

Secure data transfer

B.

Increased bandwidth

C.

Indirect access to the Internet

D.

Simplified security architecture

Which service does an Intrusion Detection System (IDS) provide?

Available Choices (select all choices that are correct)

A.

It is the lock on the door for networks and computer systems.

B.

It is effective against all vulnerabilities in networks and computer systems.

C.

It blocks malicious activity in networks and computer systems.

D.

It detects attempts to break into or misuse a computer system.

What do the tiers in the NIST CSF represent?

A.

Stages of incident response

B.

Categories of cybersecurity threats

C.

An organization's cybersecurity profile

D.

Different types of cybersecurity software

If an asset owner wants to improve their organization's ability to respond during a cyberattack, which of the following activities would be MOST appropriate to implement?

A.

Tabletop exercises

B.

Password hygiene campaign

C.

Architecture awareness workshops

D.

Anomaly detection drills for operators

What is the primary focus of Part 3-2 in the ISA/IEC 62443 series?

A.

Security technologies for IACS

B.

Cybersecurity risk assessment and system design

C.

Secure product development lifecycle requirements

D.

Technical security requirements for IACS components

Which organization is responsible for the ISA 62443 series of standards?

A.

American National Standards Institute (ANSI)

B.

International Electrotechnical Commission (IEC)

C.

National Institute of Standards and Technology (NIST)

D.

European Telecommunications Standards Institute (ETSI)

What is the primary purpose of the NIST Cybersecurity Framework (CSF)?

A.

To create new cybersecurity technologies

B.

To replace existing cybersecurity standards

C.

To enhance the resilience of critical infrastructure

D.

To provide a certification for organizations