11.11 Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

In the context of global frameworks, what does the acronym SDO stand for?

A.

Security Development Organization

B.

Software Development Organization

C.

Systematic Development Organization

D.

Standards Development Organization

As related to technical security requirements for IACS components, what does CCSC stand for?

A.

Common Component Security Criteria

B.

Common Component Security Constraints

C.

Centralized Component Security Compliance

D.

Comprehensive Component Security Controls

Why is OPC Classic considered firewall unfriendly?

Available Choices (select all choices that are correct)

A.

OPC Classic uses DCOM, which dynamically assigns any port between 1024 and 65535.

B.

OPC Classic is allowed to use only port 80.

C.

OPC Classic works with control devices from different manufacturers.

D.

OPC Classic is an obsolete communication standard.

Which of the following is an element of monitoring and improving a CSMS?

Available Choices (select all choices that are correct)

A.

Increase in staff training and security awareness

B.

Restricted access to the industrial control system to an as-needed basis

C.

Significant changes in identified risk round in periodic reassessments

D.

Review of system logs and other key data files

Which of the following ISA-99 (IEC 62443) Reference Model levels is named correctly?

Available Choices (select all choices that are correct)

A.

Level 1: Supervisory Control

B.

Level 2: Quality Control

C.

Level 3: Operations Management

D.

Level 4: Process

Which is a commonly used protocol for managing secure data transmission on the Internet?

Available Choices (select all choices that are correct)

A.

Datagram Transport Layer Security (DTLS)

B.

Microsoft Point-to-Point Encryption

C.

Secure Telnet

D.

Secure Sockets Layer

In an IACS system, a typical security conduit consists of which of the following assets?

Available Choices (select all choices that are correct)

A.

Controllers, sensors, transmitters, and final control elements

B.

Wiring, routers, switches, and network management devices

C.

Ferrous, thickwall, and threaded conduit including raceways

D.

Power lines, cabinet enclosures, and protective grounds

What are three possible entry points (pathways) that could be used for launching a cyber attack?

Available Choices (select all choices that are correct)

A.

LAN, portable media, and wireless

B.

LAN, portable media, and hard drives

C.

LAN, power source, and wireless OD.

D.

LAN, WAN, and hard drive

Which type of cryptographic algorithms requires more than one key?

Available Choices (select all choices that are correct)

A.

Block ciphers

B.

Stream ciphers

C.

Symmetric (private) key

D.

Asymmetric (public) key

What is TRUE regarding safety systems?

A.

No dedicated malware has been found targeting safety systems specifically.

B.

Even the most modern and sophisticated safety systems can be defeated by an attacker.

C.

Safety systems are an independent protection layer and as such have no cybersecurity vulnerabilities.

D.

By integrating control and safety systems via Modbus TCP, cybersecurity risks are at a tolerable level.