Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

How should CSMS organizational responsibilities or training be handled over time?

A.

They should be ignored.

B.

They should be evaluated.

C.

They should remain constant.

D.

They should be expanded indefinitely.

Which is a reason for

and physical security regulations meeting a mixed resistance?

Available Choices (select all choices that are correct)

A.

Regulations are voluntary documents.

B.

Regulations contain only informative elements.

C.

Cybersecurity risks can best be managed individually and in isolation.

D.

There are a limited number of enforced cybersecurity and physical security regulations.

Which of the following is NOT listed as a potential consequence of compromising IACS according to the ISA99 Committee scope?

A.

Losses

B.

Increased product sales

C.

Endangerment of public safety

D.

Loss of proprietary information

Which of the following is the BEST reason for periodic audits?

Available Choices (select all choices that are correct)

A.

To confirm audit procedures

B.

To meet regulations

C.

To validate that security policies and procedures are performing

D.

To adhere to a published or approved schedule

According to the scheme for cybersecurity profiles, which of the following is true about ISA/IEC 62443 security requirements when creating a security profile?

A.

New security requirements can be added freely.

B.

Only foundational requirements can be changed.

C.

No new requirements are allowed, and existing ones are not modified.

D.

Existing security requirements can be modified to fit the sector needs.

Which is a commonly used protocol for managing secure data transmission on the Internet?

Available Choices (select all choices that are correct)

A.

Datagram Transport Layer Security (DTLS)

B.

Microsoft Point-to-Point Encryption

C.

Secure Telnet

D.

Secure Sockets Layer

As related to technical security requirements for IACS components, what does CCSC stand for?

A.

Common Component Security Criteria

B.

Common Component Security Constraints

C.

Centralized Component Security Compliance

D.

Comprehensive Component Security Controls

How many maturity levels (ML) are established for evaluation criteria according to ISA/IEC 62443-2-4?

A.

2

B.

3

C.

4

D.

5

Which layer specifies the rules for Modbus Application Protocol

Available Choices (select all choices that are correct)

A.

Data link layer

B.

Session layer

C.

Presentation layer

D.

Application layer

Which of the following staff is NOT mentioned as a stakeholder in the CSMS Program?

A.

Marketing

B.

Operations

C.

IT security

D.

Physical security