Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Security Levels (SLs) are broken down into which three types?

A.

Target, capacity, and availability

B.

Target, capacity, and achieved

C.

Target, capability, and availability

D.

Target, capability, and achieved

Which NIST Special Publication focuses specifically on securing Industrial Control Systems (ICS)?

A.

SP 800-30

B.

SP 800-53

C.

SP 800-82

D.

SP 800-171

An industrial facility wants to ensure that only authorized systems reach its PLCs while minimizing disruption to time-sensitive control processes. Which type of firewall would BEST suit this need?

A.

General-purpose software firewall

B.

Unidirectional gateway (data diode)

C.

IACS-specific firewall with deep packet inspection

D.

Basic packet filter firewall without protocol awareness

What does IACS stand for?

A.

Industrial Automation and Control Systems

B.

Industrial Associations and Control Systems

C.

Integrated Automation and Control Systems

D.

International Automated and Control Systems

Which standard is applied during the Assess phase for risk assessment?

A.

ISA/IEC 62443-2-1

B.

ISA/IEC 62443-3-1

C.

ISA/IEC 62443-3-2

D.

ISA/IEC 62443-3-3

Using the risk matrix below, what is the risk of a medium likelihood event with high consequence?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which part of the standard provides a list of possible Foundational Requirements to address assessed risks?

A.

ISA/IEC 62443-3-1

B.

ISA/IEC 62443-3-2

C.

ISA/IEC 62443-3-3

D.

ISA/IEC 62443-3-4

What is TRUE regarding safety systems?

A.

No dedicated malware has been found targeting safety systems specifically.

B.

Even the most modern and sophisticated safety systems can be defeated by an attacker.

C.

Safety systems are an independent protection layer and as such have no cybersecurity vulnerabilities.

D.

By integrating control and safety systems via Modbus TCP, cybersecurity risks are at a tolerable level.

What is the primary goal of the Assess phase in the IACS Cybersecurity Lifecycle?

A.

To conduct periodic audits

B.

To implement countermeasures

C.

To assign a Target Security Level (SL-T)

D.

To ensure the Achieved Security Level (SL-A) meets the Target Security Level (SL-T)

Which type of cryptographic algorithms requires more than one key?

Available Choices (select all choices that are correct)

A.

Block ciphers

B.

Stream ciphers

C.

Symmetric (private) key

D.

Asymmetric (public) key