Which of the following is the BEST reason for periodic audits?
Available Choices (select all choices that are correct)
Which analysis method is MOST frequently used as an input to a security risk assessment?
Available Choices (select all choices that are correct)
Which of the following is the BEST example of detection-in-depth best practices?
Available Choices (select all choices that are correct)
What are three possible entry points (pathways) that could be used for launching a cyber attack?
Available Choices (select all choices that are correct)
Who must be included in a training and security awareness program?
Available Choices (select all choices that are correct)
Which of the following are the critical variables related to access control?
Available Choices (select all choices that are correct)
Which service does an Intrusion Detection System (IDS) provide?
Available Choices (select all choices that are correct)
How many security levels are in the ISASecure certification program?
Available Choices (select all choices that are correct)
Which activity is part of establishing policy, organization, and awareness?
Available Choices (select all choices that are correct)
Using the risk matrix below, what is the risk of a medium likelihood event with high consequence?
As related to IACS Maintenance Service Providers, when do maintenance activities generally start?
Which is a reason for
and physical security regulations meeting a mixed resistance?
Available Choices (select all choices that are correct)
What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?
In an IACS system, a typical security conduit consists of which of the following assets?
Available Choices (select all choices that are correct)
Which is the BEST practice when establishing security zones?
Available Choices (select all choices that are correct)
How many maturity levels (ML) are established for evaluation criteria according to ISA/IEC 62443-2-4?
In a defense-in-depth strategy, what is the purpose of role-based access control?
Available Choices (select all choices that are correct)
Which of the following is an element of security policy, organization, and awareness?
Available Choices (select all choices that are correct)
Which of the following is an example of separation of duties as a part of system development and maintenance?
Available Choices (select all choices that are correct)
Which analysis method is MOST frequently used as an input to a security risk assessment?
Available Choices (select all choices that are correct)
Which is a physical layer standard for serial communications between two or more devices?
Available Choices (select all choices that are correct)
Which is a PRIMARY reason why network security is important in IACS environments?
Available Choices (select all choices that are correct)
After receiving an approved patch from the JACS vendor, what is BEST practice for the asset owner to follow?
Which steps are part of implementing countermeasures?
Available Choices (select all choices that are correct)
What is one of the primary causes of cyber-related production losses in process control systems?
Which is NOT a potential consequence for organizations that fail to prioritize control system security?
What is the purpose of ISO/IEC 15408 (Common Criteria)?
Available Choices (select all choices that are correct)
Which of the following is the underlying protocol for Ethernet/IP?
Available Choices (select all choices that are correct)
Which steps are included in the ISA/IEC 62443 assess phase?
Available Choices (select all choices that are correct)
Which layer specifies the rules for Modbus Application Protocol
Available Choices (select all choices that are correct)
Which of the following is an activity that should trigger a review of the CSMS?
Available Choices (select all choices that are correct)