Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How many element qroups are in the "Addressinq Risk" CSMS cateqorv?

Available Choices (select all choices that are correct)

A.

2

B.

3

C.

4

D.

5

What are the four main categories for documents in the ISA-62443 (IEC 62443) series?

Available Choices (select all choices that are correct)

A.

General. Policies and Procedures. System, and Component

B.

End-User, Integrator, Vendor, and Regulator

C.

Assessment. Mitigation. Documentation, and Maintenance

D.

People. Processes. Technology, and Training

Which policies and procedures publication is titled Patch Manaqement in the IACS Environment?

Available Choices (select all choices that are correct)

A.

ISA-TR62443-2-3

B.

ISA-TR62443-1-4

C.

ISA-62443-3-3

D.

ISA-62443-4-2

What are the two sublayers of Layer 2?

Available Choices (select all choices that are correct)

A.

HIDS and NIDS

B.

LLC and MAC

C.

OPC and DCOM

D.

VLAN and VPN

Which statement is TRUE regarding Intrusion Detection Systems (IDS)?

Available Choices (select all choices that are correct)

A.

Modern IDS recognize IACS devices by default.

B.

They are very inexpensive to design and deploy.

C.

They are effective against known vulnerabilities.

D.

They require a small amount of care and feeding

In which layer is the physical address assigned?

Available Choices (select all choices that are correct)

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 7

Why is OPC Classic considered firewall unfriendly?

Available Choices (select all choices that are correct)

A.

OPC Classic uses DCOM, which dynamically assigns any port between 1024 and 65535.

B.

OPC Classic is allowed to use only port 80.

C.

OPC Classic works with control devices from different manufacturers.

D.

OPC Classic is an obsolete communication standard.

Which of the following is an element of security policy, organization, and awareness?

Available Choices (select all choices that are correct)

A.

Product development requirements

B.

Staff training and security awareness

C.

Technical requirement assessment

D.

Penetration testing

Whose responsibility is it to determine the level of risk an organization is willing to tolerate?

Available Choices (select all choices that are correct)

A.

Management

B.

Legal Department

C.

Operations Department

D.

Safety Department

Which of the following is a recommended default rule for IACS firewalls?

Available Choices (select all choices that are correct)

A.

Allow all traffic by default.

B.

Allow IACS devices to access the Internet.

C.

Allow traffic directly from the IACS network to the enterprise network.

D.

Block all traffic by default.