Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A manufacturing plant wants to improve its risk management by categorizing all equipment and tracking their status and relationships. Which framework should it implement?

A.

Conduits

B.

Asset models

C.

Security zones

D.

Reference architecture

Why is OPC Classic considered firewall unfriendly?

A.

It allows use of only port 80.

B.

It dynamically assigns several ports.

C.

It is an obsolete communication standard.

D.

It works with control devices from different manufacturers.

According to ISA/IEC TR 62443-1-5, which documents can be referenced when creating a security profile?

A.

Only ISA/IEC 62443-3-3 and 4-1

B.

Only ISA/IEC 62443-1-1 and 1-2

C.

ISA/IEC 62443-2-1, 2-4, 3-3, 4-1, and 4-2

D.

Any cybersecurity standard outside the ISA/IEC 62443 series

Which of the following BEST describes a control system?

A.

Actions to prevent loss of revenue

B.

Unauthorized modifications to data

C.

Hardware and software components of an IACS

D.

Measures taken to protect against unauthorized access

Which is the BEST deployment system for malicious code protection?

Available Choices (select all choices that are correct)

A.

Network segmentation

B.

IACS protocol converters

C.

Application whitelistinq (AWL) OD.

D.

Zones and conduits

What is the PRIMARY goal of the IACS Security Program (SP) requirements according to ISA/IEC 62443-2-1?

A.

To mitigate risk

B.

To implement technologies only

C.

To focus solely on physical security measures

D.

To eliminate all cybersecurity risks completely

What type of security level defines what a component or system is capable of meeting?

Available Choices (select all choices that are correct)

A.

Capability security level

B.

Achieved security level

C.

Design security level

D.

Target security level

Authorization (user accounts) must be granted based on which of the following?

Available Choices (select all choices that are correct)

A.

Individual preferences

B.

Common needs for large groups

C.

Specific roles

D.

System complexity

Multiuser accounts and shared passwords inherently carry which of the followinq risks?

Available Choices (select all choices that are correct)

A.

Privilege escalation

B.

Buffer overflow

C.

Unauthorized access

D.

Race conditions

Which of the following activities is NOT listed under the "Patch Testing" phase in the asset owner requirements?

A.

Notification

B.

File authenticity

C.

Removal procedure

D.

Qualification and verification