3 Months Free Update
3 Months Free Update
3 Months Free Update
Which of the following is an element of security policy, organization, and awareness?
Available Choices (select all choices that are correct)
Security Levels (SLs) are broken down into which three types?
Available Choices (select all choices that are correct)
Which is a commonly used protocol for managing secure data transmission on the Internet?
Available Choices (select all choices that are correct)
What type of security level defines what a component or system is capable of meeting?
Available Choices (select all choices that are correct)
What is the FIRST step required in implementing ISO 27001?
Available Choices (select all choices that are correct)
Which is an important difference between IT systems and IACS?
Available Choices (select all choices that are correct)
How many element qroups are in the "Addressinq Risk" CSMS cateqorv?
Available Choices (select all choices that are correct)
Which of the ISA 62443 standards focuses on the process of developing secure products?
Available Choices (select all choices that are correct)
Which is the BEST practice when establishing security zones?
Available Choices (select all choices that are correct)
Which of the following is the underlying protocol for Ethernet/IP?
Available Choices (select all choices that are correct)
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?
Available Choices (select all choices that are correct)
What do packet filter firewalls examine?
Available Choices (select all choices that are correct)
Which layer in the Open Systems Interconnection (OSI) model would include the use of the File Transfer Protocol (FTP)?
Available Choices (select all choices that are correct)
Which communications system covers a large geographic area?
Available Choices (select all choices that are correct)
How many security levels are in the ISASecure certification program?
Available Choices (select all choices that are correct)
Which of the following refers to internal rules that govern how an organization protects critical system resources?
Available Choices (select all choices that are correct)
Which of the following ISA-99 (IEC 62443) Reference Model levels is named correctly?
Available Choices (select all choices that are correct)
Which statement is TRUE regarding Intrusion Detection Systems (IDS)?
Available Choices (select all choices that are correct)
What is the purpose of ISO/IEC 15408 (Common Criteria)?
Available Choices (select all choices that are correct)
Which of the following PRIMARILY determines access privileges for user accounts?
Available Choices (select all choices that are correct)