Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What.are the two elements of the risk analysis category of an IACS?

Available Choices (select all choices that are correct)

A.

Risk evaluation and risk identification

B.

Business rationale and risk reduction and avoidance

C.

Business rationale and risk identification and classification

D.

Business recovery and risk elimination or mitigation

Which of the following PRIMARILY determines access privileges for user accounts?

Available Choices (select all choices that are correct)

A.

Users' desire for ease of use

B.

Authorization security policy

C.

Common practice

D.

Technical capability

What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?

Available Choices (select all choices that are correct)

A.

HTTPS

B.

IPSec

C.

MPLS

D.

SSH

Which is the BEST deployment system for malicious code protection?

Available Choices (select all choices that are correct)

A.

Network segmentation

B.

IACS protocol converters

C.

Application whitelistinq (AWL) OD.

D.

Zones and conduits

Electronic security, as defined in ANSI/ISA-99.00.01:2007. includes which of the following?

Available Choices (select all choices that are correct)

A.

Security guidelines for the proper configuration of IACS computers and operating systems

B.

Computers, networks, operating systems, applications, and other programmable configurable components of the system

C.

Personnel, policies, and procedures related to the security of computers, networks. PLCs, and other programmable configurable components of the system

D.

Security guidelines for the proper configuration of IACS PLCs and other programmable configurable components of the system

Who must be included in a training and security awareness program?

Available Choices (select all choices that are correct)

A.

Vendors and suppliers

B.

Employees

C.

All personnel

D.

Temporary staff

Which of the following is a cause for the increase in attacks on IACS?

Available Choices (select all choices that are correct)

A.

Use of proprietary communications protocols

B.

The move away from commercial off the shelf (COTS) systems, protocols, and networks

C.

Knowledge of exploits and tools readily available on the Internet

D.

Fewer personnel with system knowledge having access to IACS

In an IACS system, a typical security conduit consists of which of the following assets?

Available Choices (select all choices that are correct)

A.

Controllers, sensors, transmitters, and final control elements

B.

Wiring, routers, switches, and network management devices

C.

Ferrous, thickwall, and threaded conduit including raceways

D.

Power lines, cabinet enclosures, and protective grounds

Which is an important difference between IT systems and IACS?

Available Choices (select all choices that are correct)

A.

The IACS security priority is integrity.

B.

The IT security priority is availability.

C.

IACS cybersecurity must address safety issues.

D.

Routers are not used in IACS networks.

Which of the following ISA-99 (IEC 62443) Reference Model levels is named correctly?

Available Choices (select all choices that are correct)

A.

Level 1: Supervisory Control

B.

Level 2: Quality Control

C.

Level 3: Operations Management

D.

Level 4: Process