3 Months Free Update
3 Months Free Update
3 Months Free Update
Which layer specifies the rules for Modbus Application Protocol
Available Choices (select all choices that are correct)
What is the name of the protocol that implements serial Modbus over Ethernet?
Available Choices (select all choices that are correct)
After receiving an approved patch from the JACS vendor, what is BEST practice for the asset owner to follow?
What is the definition of "defense in depth" when referring to
Available Choices (select all choices that are correct)
Which statement is TRUE reqardinq application of patches in an IACS environment?
Available Choices (select all choices that are correct)
What does the abbreviation CSMS round in ISA 62443-2-1 represent?
Available Choices (select all choices that are correct)
Which steps are part of implementing countermeasures?
Available Choices (select all choices that are correct)
Which of the following starts at a high level and includes all ANSI/ISA-95 Level 0,1,2,3,4 equipment and information systems?
Which is the PRIMARY reason why Modbus over Ethernet is easy to manaqe in a firewall?
Available Choices (select all choices that are correct)
Which of the following provides the overall conceptual basis in the design of an appropriate security program?
Which of the following is an industry sector-specific standard?
Available Choices (select all choices that are correct)
Authorization (user accounts) must be granted based on which of the following?
Available Choices (select all choices that are correct)
Which of the following tools has the potential for serious disruption of a control network and should not be used on a live system?
Available Choices (select all choices that are correct)
Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?
Available Choices (select all choices that are correct)
Which is an important difference between IT systems and IACS?
Available Choices (select all choices that are correct)
In a defense-in-depth strategy, what is the purpose of role-based access control?
Available Choices (select all choices that are correct)
Which of the following is an element of security policy, organization, and awareness?
Available Choices (select all choices that are correct)
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
Which of the following is an example of separation of duties as a part of system development and maintenance?
Available Choices (select all choices that are correct)
Who must be included in a training and security awareness program?
Available Choices (select all choices that are correct)
How many element qroups are in the "Addressinq Risk" CSMS cateqorv?
Available Choices (select all choices that are correct)
Which is a role of the application layer?
Available Choices (select all choices that are correct)
What is the primary audience for Part 2-5 of the ISA/IEC 62443 Series - Policies & Procedures group of standards?
What does Foundational Requirement 6 (FR 6) - Timely Response to Events (TRE) require?
Which is the implementation of PROFIBUS over Ethernet for non-safety-related communications?
Available Choices (select all choices that are correct)
Which of the following is the BEST example of detection-in-depth best practices?
Available Choices (select all choices that are correct)
Which organization manages the ISASecure conformance certification program?
Available Choices (select all choices that are correct)
What is a key aspect of the relationship between physical security measures and cybersecurity?
Which communications system covers a large geographic area?
Available Choices (select all choices that are correct)