Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Whose responsibility is it to determine the level of risk an organization is willing to tolerate?

Available Choices (select all choices that are correct)

A.

Management

B.

Legal Department

C.

Operations Department

D.

Safety Department

Within the National Institute of Standards and Technoloqv Cybersecuritv Framework v1.0 (NIST CSF), what is the status of the ISA 62443 standards?

Available Choices (select all choices that are correct)

A.

They are used as informative references.

B.

They are used as normative references.

C.

They are under consideration for future use.

D.

They are not used.

At Layer 4 of the Open Systems Interconnection (OSI) model, what identifies the application that will handle a packet inside a host?

Available Choices (select all choices that are correct)

A.

ATCP/UDP application ID

B.

A TCP/UDP host ID

C.

ATCP/UDP port number

D.

ATCP/UDP registry number

What programs are MOST effective if they are tailored to the audience, consistent with company policy, and communicated regularly?

A.

CSMS development

B.

Cybersecurity awareness programs

C.

Control systems adjustment programs

D.

ISCS cybersecurity certification programs

Which is a PRIMARY reason why network security is important in IACS environments?

Available Choices (select all choices that are correct)

A.

PLCs are inherently unreliable.

B.

PLCs are programmed using ladder logic.

C.

PLCs use serial or Ethernet communications methods.

D.

PLCs under cyber attack can have costly and dangerous impacts.

If an asset owner wants to demonstrate compliance with ISA/IEC 62443-2-1 requirements during an external audit, which type of evidence would be MOST appropriate?

A.

Financial investment records in cybersecurity tools only

B.

Anecdotal reports from employees about security practices

C.

Documentation verifying use and configuration of technologies

D.

Marketing materials describing the company's commitment to security

A company discovers malware on a portable USB device used within their IACS environment. According to the document, which SP Element and controls would be MOST relevant to address this issue?

A.

SP Element 1 — Processes for discovery of security anomalies

B.

SP Element 2 — Asset inventory baseline

C.

SP Element 4 — Component hardening and dedicated portable media

D.

SP Element 7 — Incident handling and response

What does ISASecure primarily focus on?

A.

Developing internal testing labs

B.

Certifying IACS products and systems for cybersecurity

C.

Offering assessments for integrator site engineering practices

D.

Managing asset owner operations and maintenance practices

Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?

A.

Aligned development process

B.

Aligned needs of industrial users

C.

Well-documented security policies and procedures

D.

Defense-in-depth approach to designing

As related to IACS Maintenance Service Providers, when do maintenance activities generally start?

A.

During the design phase

B.

At the beginning of the project

C.

After the handover of the solution

D.

Before the handover of the solution