Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following are the critical variables related to access control?

Available Choices (select all choices that are correct)

A.

Reporting and monitoring

B.

Account management and monitoring

C.

Account management and password strength

D.

Password strength and change frequency

Which of the following refers to internal rules that govern how an organization protects critical system resources?

Available Choices (select all choices that are correct)

A.

Formal guidance

B.

Legislation

C.

Security policyD- Code of conduct

What are three possible entry points (pathways) that could be used for launching a cyber attack?

Available Choices (select all choices that are correct)

A.

LAN, portable media, and wireless

B.

LAN, portable media, and hard drives

C.

LAN, power source, and wireless OD.

D.

LAN, WAN, and hard drive

Which of the following is an industry sector-specific standard?

Available Choices (select all choices that are correct)

A.

ISA-62443 (EC 62443)

B.

NIST SP800-82

C.

API 1164

D.

D. ISO 27001

Which of the following BEST describes ‘Vulnerability’?

A.

An exploitable flaw in management

B.

An event that could breach security

C.

The potential for violation of security

D.

The result that occurs from a particular incident

Why were PLCs originally designed?

A.

To replace relays

B.

To service I/O exclusively

C.

To enhance network security

D.

To improve Ethernet functionality

Which of the following is NOT a general class of firewalls?

A.

Packet filter

B.

Network monitor

C.

Application proxy

D.

Stateful inspection

What is a key aspect of the relationship between physical security measures and cybersecurity?

A.

Cybersecurity is irrelevant.

B.

Physical security is more important.

C.

They should operate independently.

D.

They should complement each other.