11.11 Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?

Available Choices (select all choices that are correct)

A.

Aligned development process

B.

Aligned needs of industrial users

C.

Well-documented security policies and procedures

D.

Defense-in-depth approach to designing

Which of the following is the BEST example of detection-in-depth best practices?

Available Choices (select all choices that are correct)

A.

Firewalls and unexpected protocols being used

B.

IDS sensors deployed within multiple zones in the production environment

C.

Role-based access control and unusual data transfer patterns

D.

Role-based access control and VPNs

Whose responsibility is it to determine the level of risk an organization is willing to tolerate?

Available Choices (select all choices that are correct)

A.

Management

B.

Legal Department

C.

Operations Department

D.

Safety Department

In what step of the development process of the CSMS is “Establish purpose, organizational support, resources, and scope” taken care of?

A.

Initiate the CSMS program.

B.

Conduct an initial/high-level risk assessment.

C.

Create reference architecture.

D.

Establish policy, organization, and awareness.

What is the purpose of ISO/IEC 15408 (Common Criteria)?

Available Choices (select all choices that are correct)

A.

To define a security management organization

B.

To describe a process for risk management

C.

To define a product development evaluation methodology

D.

To describe what constitutes a secure product

Which of the following are the critical variables related to access control?

Available Choices (select all choices that are correct)

A.

Reporting and monitoring

B.

Account management and monitoring

C.

Account management and password strength

D.

Password strength and change frequency

What is one challenge associated with firewalls?

A.

Difficulty of installation

B.

Need for constant updates

C.

That they can only filter HTTP traffic

D.

Deciding how they should be configured

In which layer is the physical address assigned?

Available Choices (select all choices that are correct)

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 7

What are the four documents that belong to the General category of the ISA-62443 (IEC 62443) series?

A.

Part 1-1: Terminology, concepts, and models; Part 1-2: Master glossary of terms and definitions; Part 1-3: Security program ratings; and Part 1-4: IACS security lifecycle and use cases

B.

Part 1-1: Terminology, concepts, and models; Part 1-2: Master glossary of terms and definitions; Part 1-3: Security technologies for IACS; and Part 1-4: IACS security lifecycle and use cases

C.

Part 1-1: Terminology, concepts, and models; Part 1-2: Master glossary of terms and definitions; Part 1-3: System security conformance metrics; and Part 1-4: IACS security lifecycle and use cases

D.

Part 1-1: Terminology, concepts, and models; Part 1-2: Master glossary of terms and definitions; Part 1-3: System security conformance metrics; and Part 1-4: Security program requirements for IACS service providers

What is the primary focus of Part 3-2 in the ISA/IEC 62443 series?

A.

Security technologies for IACS

B.

Cybersecurity risk assessment and system design

C.

Secure product development lifecycle requirements

D.

Technical security requirements for IACS components