Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is Modbus?

A.

A programming language

B.

A network security standard

C.

A type of industrial machinery

D.

A serial communications protocol

Which activity is part of establishing policy, organization, and awareness?

Available Choices (select all choices that are correct)

A.

Communicate policies.

B.

Establish the risk tolerance.

C.

Identify detailed vulnerabilities.

D.

Implement countermeasures.

What is the purpose of ICS-CERT Alerts?

A.

To inform about hardware upgrades

B.

To advertise cybersecurity services

C.

To notify the owners of critical infrastructure

D.

To alert of targeted global energy sector threats

A manufacturing plant is developing a cybersecurity plan for its IACS that must evolve as new threats emerge and system changes occur. Which document should serve as the foundation for this evolving security approach?

A.

IEC 62443-2-2 only

B.

Security Program (SP) portfolio

C.

Corporate KPIs unrelated to IACS

D.

Security Protection Scheme (SPS)

Which of the following is NOT a strategy for deploying a WAN?

A.

Internet

B.

Enterprise WANs

C.

Local area networks

D.

Carrier-managed WANs

Which analysis method is MOST frequently used as an input to a security risk assessment?

Available Choices (select all choices that are correct)

A.

Failure Mode and Effects Analysis

B.

Job Safety Analysis

C.

Process Hazard Analysis (PHA)

D.

System Safety Analysis (SSA)

Which of the following attacks relies on a human weakness to succeed?

Available Choices (select all choices that are correct)

A.

Denial-of-service

B.

Phishing

C.

Escalation-of-privileges

D.

Spoofing

What programs are MOST effective if they are tailored to the audience, consistent with company policy, and communicated regularly?

A.

CSMS development programs

B.

Cybersecurity awareness programs

C.

Control systems adjustment programs

D.

ISCS cybersecurity certification programs

Which communications system covers a large geographic area?

Available Choices (select all choices that are correct)

A.

Campus Area Network (CAN)

B.

Local Area Network (LAN)

C.

Storage Area Network

D.

Wide Area Network (WAN)

According to the scheme for cybersecurity profiles, which of the following is true about ISA/IEC 62443 security requirements when creating a security profile?

A.

New security requirements can be added freely.

B.

Only foundational requirements can be changed.

C.

No new requirements are added and existing ones are not modified.

D.

Existing security requirements can be modified to fit sector needs.