In a defense-in-depth strategy, what is the purpose of role-based access control?
Available Choices (select all choices that are correct)
Why is patch management more difficult for IACS than for business systems?
Available Choices (select all choices that are correct)
Which of the following is a cause for the increase in attacks on IACS?
Available Choices (select all choices that are correct)
Which is a PRIMARY reason why network security is important in IACS environments?
Available Choices (select all choices that are correct)
What do packet filter firewalls examine?
Available Choices (select all choices that are correct)
How many element qroups are in the "Addressinq Risk" CSMS cateqorv?
Available Choices (select all choices that are correct)
Which organization manages the ISASecure conformance certification program?
Available Choices (select all choices that are correct)
Which statement is TRUE reqardinq application of patches in an IACS environment?
Available Choices (select all choices that are correct)
Which is a common pitfall when initiating a CSMS program?
Available Choices (select all choices that are correct)
Which is the PRIMARY reason why Modbus over Ethernet is easy to manaqe in a firewall?
Available Choices (select all choices that are correct)
What is the name of the protocol that implements serial Modbus over Ethernet?
Available Choices (select all choices that are correct)
Which of the ISA 62443 standards focuses on the process of developing secure products?
Available Choices (select all choices that are correct)
Which of the following PRIMARILY determines access privileges for user accounts?
Available Choices (select all choices that are correct)
Electronic security, as defined in ANSI/ISA-99.00.01:2007. includes which of the following?
Available Choices (select all choices that are correct)
Which statement is TRUE regarding Intrusion Detection Systems (IDS)?
Available Choices (select all choices that are correct)
Which is the implementation of PROFIBUS over Ethernet for non-safety-related communications?
Available Choices (select all choices that are correct)
What.are the two elements of the risk analysis category of an IACS?
Available Choices (select all choices that are correct)
Which of the following provides the overall conceptual basis in the design of an appropriate security program?
Available Choices (select all choices that are correct)
Which is the PRIMARY objective when defining a security zone?
Available Choices (select all choices that are correct)
What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?
Which type of cryptographic algorithms requires more than one key?
Available Choices (select all choices that are correct)
Which is a physical layer standard for serial communications between two or more devices?
Available Choices (select all choices that are correct)
Which of the following is an element of security policy, organization, and awareness?
Available Choices (select all choices that are correct)
What type of security level defines what a component or system is capable of meeting?
Available Choices (select all choices that are correct)
Which layer specifies the rules for Modbus Application Protocol
Available Choices (select all choices that are correct)
What is OPC?
Available Choices (select all choices that are correct)