Which statement is TRUE reqardinq application of patches in an IACS environment?
Available Choices (select all choices that are correct)
A. Patches should be applied as soon as they are available.
B. Patches should be applied within one month of availability.
C. Patches never should be applied in an IACS environment.
D. Patches should be applied based on the organization's risk assessment.
What do packet filter firewalls examine?
Available Choices (select all choices that are correct)
A. The packet structure and sequence
B. The relationships between packets in a session
C. Every incoming packet up to the application layer
D. Only the source, destination, and ports in the header of each packet
Which organization manages the ISASecure conformance certification program?
Available Choices (select all choices that are correct)
A. American Society for Industrial Security
B. Automation Federation
C. National Institute of Standards and Technology
D. Security Compliance Institute
Which analysis method is MOST frequently used as an input to a security risk assessment?
Available Choices (select all choices that are correct)
A. Failure Mode and Effects Analysis
B. Job Safety Analysis(JSA)
C. Process Hazard Analysis (PHA)
D. System Safety Analysis(SSA)
Which is the PRIMARY objective when defining a security zone?
Available Choices (select all choices that are correct)
A. All assets in the zone must be from the same vendor.
B. All assets in the zone must share the same security requirements.
C. All assets in the zone must be at the same level in the Purdue model.
D. All assets in the zone must be physically located in the same area.
Which activity is part of establishing policy, organization, and awareness?
Available Choices (select all choices that are correct)
A. Communicate policies.
B. Establish the risk tolerance.
C. Identify detailed vulnerabilities.
D. Implement countermeasures.
What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?
A. Control
B. Protocol
C. Transport
D. User
Which steps are included in the ISA/IEC 62443 assess phase?
Available Choices (select all choices that are correct)
A. Cybersecurity requirements specification and detailed cyber risk assessment
B. Cybersecurity requirements specification and allocation of IACS assets to zones and conduits
C. Detailed cyber risk assessment and cybersecurity maintenance, monitoring, and management of change
D. Allocation of IACS assets to zones and conduits, and detailed cyber risk assessment
In an IACS system, a typical security conduit consists of which of the following assets?
Available Choices (select all choices that are correct)
A. Controllers, sensors, transmitters, and final control elements
B. Wiring, routers, switches, and network management devices
C. Ferrous, thickwall, and threaded conduit including raceways
D. Power lines, cabinet enclosures, and protective grounds
In which layer is the physical address assigned?
Available Choices (select all choices that are correct)
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 7