What does the abbreviation CSMS round in ISA 62443-2-1 represent?
Available Choices (select all choices that are correct)
What is the name of the protocol that implements serial Modbus over Ethernet?
Available Choices (select all choices that are correct)
Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?
Available Choices (select all choices that are correct)
Which is a physical layer standard for serial communications between two or more devices?
Available Choices (select all choices that are correct)
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
Which is NOT a potential consequence for organizations that fail to prioritize control system security?
Which of the following is an element of security policy, organization, and awareness?
Available Choices (select all choices that are correct)
What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?
Available Choices (select all choices that are correct)
What is a feature of an asymmetric key?
Available Choices (select all choices that are correct)
At Layer 4 of the Open Systems Interconnection (OSI) model, what identifies the application that will handle a packet inside a host?
Available Choices (select all choices that are correct)
Security Levels (SLs) are broken down into which three types?
Available Choices (select all choices that are correct)
Which of the following staff is NOT mentioned as a stakeholder in the CSMS Program?
Which part of the ISA/IEC 62443 series describes a methodology to develop quantitative metrics?
Which of the following are the critical variables related to access control?
Available Choices (select all choices that are correct)
Which of the following is the BEST example of detection-in-depth best practices?
Available Choices (select all choices that are correct)
What type of attack is characterized by encrypting an organization’s data and demanding payment for restoration?
What is defined as the hardware and software components of an IACS?
Available Choices (select all choices that are correct)
Which service does an Intrusion Detection System (IDS) provide?
Available Choices (select all choices that are correct)
Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?
Available Choices (select all choices that are correct)
What is recommended to use between the plant floor and the rest of the company networks?
Which of the following provides the overall conceptual basis in the design of an appropriate security program?
Which of the following is a trend that has caused a significant percentage of security vulnerabilities?
Available Choices (select all choices that are correct)
In which layer is the physical address assigned?
Available Choices (select all choices that are correct)
Which layer in the Open Systems Interconnection (OSI) model would include the use of the File Transfer Protocol (FTP)?
Available Choices (select all choices that are correct)
Which is the PRIMARY reason why Modbus over Ethernet is easy to manaqe in a firewall?
Available Choices (select all choices that are correct)
Which of the following provides the overall conceptual basis in the design of an appropriate security program?
Available Choices (select all choices that are correct)
Who must be included in a training and security awareness program?
Available Choices (select all choices that are correct)
Which type of cryptographic algorithms requires more than one key?
Available Choices (select all choices that are correct)
How many maturity levels (ML) are established for evaluation criteria according to ISA/IEC 62443-2-4?