11.11 Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is a frequent mistake made with cybersecurity management?

A.

Ignoring organizational culture

B.

Focusing solely on technology solutions

C.

Implementing too many security practices at once

D.

Initially addressing smaller pieces of the entire system

Authorization (user accounts) must be granted based on which of the following?

Available Choices (select all choices that are correct)

A.

Individual preferences

B.

Common needs for large groups

C.

Specific roles

D.

System complexity

In terms of availability requirements, how do IACS and IT differ?

A.

IACS tolerates occasional failures while IT does not.

B.

Rebooting is never acceptable in IT but tolerated in IACS.

C.

Both IACS and IT have the same availability requirements.

D.

Continuous operation is expected in IT while scheduled operation is sufficient for IACS.

Which U.S. Department is responsible for the Chemical Facility Anti-Terrorism Standards (CFATS)?

A.

Department of Energy

B.

Nuclear Regulatory Commission

C.

Department of Homeland Security

D.

Transportation Security Administration

At Layer 4 of the Open Systems Interconnection (OSI) model, what identifies the application that will handle a packet inside a host?

Available Choices (select all choices that are correct)

A.

ATCP/UDP application ID

B.

A TCP/UDP host ID

C.

ATCP/UDP port number

D.

ATCP/UDP registry number

What is the name of the protocol that implements serial Modbus over Ethernet?

Available Choices (select all choices that are correct)

A.

MODBUS/CIP

B.

MODBUS/Ethernet

C.

MODBUS/Plus

D.

MODBUS/TCP

What type of cyberattack was discussed in the Ukrainian power grid case study?

A.

Internal sabotage

B.

Nation state

C.

Insider threat

D.

Random hacking

How many element qroups are in the "Addressinq Risk" CSMS cateqorv?

Available Choices (select all choices that are correct)

A.

2

B.

3

C.

4

D.

5

What does IACS stand for?

A.

Industrial Automation and Control Systems

B.

Industrial Associations and Control Systems

C.

Integrated Automation and Control Systems

D.

International Automated and Control Systems

What does a demilitarized zone (DMZ) provide in network security?

A.

Secure data transfer

B.

Increased bandwidth

C.

Indirect access to the Internet

D.

Simplified security architecture