New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

ISA ISA-IEC-62443 ISA/IEC 62443 Cybersecurity Fundamentals Specialist Exam Practice Test

Demo: 26 questions
Total 88 questions

ISA/IEC 62443 Cybersecurity Fundamentals Specialist Questions and Answers

Question 1

Which is the BEST practice when establishing security zones?

Available Choices (select all choices that are correct)

Options:

A.

Security zones should contain assets that share common security requirements.

B.

Security zones should align with physical network segments.

C.

Assets within the same logical communication network should be in the same security zone.

D.

All components in a large or complex system should be in the same security zone.

Question 2

Which is a physical layer standard for serial communications between two or more devices?

Available Choices (select all choices that are correct)

Options:

A.

RS232

B.

RS235

C.

RS432

D.

RS435

Question 3

What do packet filter firewalls examine?

Available Choices (select all choices that are correct)

Options:

A.

The packet structure and sequence

B.

The relationships between packets in a session

C.

Every incoming packet up to the application layer

D.

Only the source, destination, and ports in the header of each packet

Question 4

What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?

Available Choices (select all choices that are correct)

Options:

A.

HTTPS

B.

IPSec

C.

MPLS

D.

SSH

Question 5

What is the definition of "defense in depth" when referring to

Available Choices (select all choices that are correct)

Options:

A.

Using countermeasures that have intrinsic technical depth.

B.

Aligning all resources to provide a broad technical gauntlet

C.

Requiring a minimum distance requirement between security assets

D.

Applying multiple countermeasures in a layered or stepwise manner

Question 6

Authorization (user accounts) must be granted based on which of the following?

Available Choices (select all choices that are correct)

Options:

A.

Individual preferences

B.

Common needs for large groups

C.

Specific roles

D.

System complexity

Question 7

Electronic security, as defined in ANSI/ISA-99.00.01:2007. includes which of the following?

Available Choices (select all choices that are correct)

Options:

A.

Security guidelines for the proper configuration of IACS computers and operating systems

B.

Computers, networks, operating systems, applications, and other programmable configurable components of the system

C.

Personnel, policies, and procedures related to the security of computers, networks. PLCs, and other programmable configurable components of the system

D.

Security guidelines for the proper configuration of IACS PLCs and other programmable configurable components of the system

Question 8

What.are the two elements of the risk analysis category of an IACS?

Available Choices (select all choices that are correct)

Options:

A.

Risk evaluation and risk identification

B.

Business rationale and risk reduction and avoidance

C.

Business rationale and risk identification and classification

D.

Business recovery and risk elimination or mitigation

Question 9

What does Layer 1 of the ISO/OSI protocol stack provide?

Available Choices (select all choices that are correct)

Options:

A.

Data encryption, routing, and end-to-end connectivity

B.

Framing, converting electrical signals to data, and error checking

C.

The electrical and physical specifications of the data connection

D.

User applications specific to network applications such as reading data registers in a PLC

Question 10

Which of the following is the underlying protocol for Ethernet/IP?

Available Choices (select all choices that are correct)

Options:

A.

Building Automation and Control Network (BACnet)

B.

Common Industrial Protocol

C.

Highway Addressable Remote Transducer (HART)

D.

Object Linking and Embedding (OLE) for Process Control

Question 11

Which is the PRIMARY reason why Modbus over Ethernet is easy to manaqe in a firewall?

Available Choices (select all choices that are correct)

Options:

A.

Modbus uses a single master to communicate with multiple slaves usinq simple commands.

B.

Modbus is a proprietary protocol that is widely supported by vendors.

C.

Modbus uses explicit source and destination IP addresses and a sinqle known TCP port.

D.

Modbus has no known security vulnerabilities, so firewall rules are simple to implement.

Question 12

Which of the following ISA-99 (IEC 62443) Reference Model levels is named correctly?

Available Choices (select all choices that are correct)

Options:

A.

Level 1: Supervisory Control

B.

Level 2: Quality Control

C.

Level 3: Operations Management

D.

Level 4: Process

Question 13

Which of the following are the critical variables related to access control?

Available Choices (select all choices that are correct)

Options:

A.

Reporting and monitoring

B.

Account management and monitoring

C.

Account management and password strength

D.

Password strength and change frequency

Question 14

What is the name of the protocol that implements serial Modbus over Ethernet?

Available Choices (select all choices that are correct)

Options:

A.

MODBUS/CIP

B.

MODBUS/Ethernet

C.

MODBUS/Plus

D.

MODBUS/TCP

Question 15

Why is patch management more difficult for IACS than for business systems?

Available Choices (select all choices that are correct)

Options:

A.

Overtime pay is required for technicians.

B.

Many more approvals are required.

C.

Patching a live automation system can create safety risks.

D.

Business systems automatically update.

Question 16

What does the abbreviation CSMS round in ISA 62443-2-1 represent?

Available Choices (select all choices that are correct)

Options:

A.

Control System Management System

B.

Control System Monitoring System

C.

Cyber Security Management System

D.

Cyber Security Monitoring System

Question 17

Which is the implementation of PROFIBUS over Ethernet for non-safety-related communications?

Available Choices (select all choices that are correct)

Options:

A.

PROFIBUS DP

B.

PROFIBUS PA

C.

PROFINET

D.

PROF1SAFE

Question 18

Which of the following is the BEST reason for periodic audits?

Available Choices (select all choices that are correct)

Options:

A.

To confirm audit procedures

B.

To meet regulations

C.

To validate that security policies and procedures are performing

D.

To adhere to a published or approved schedule

Question 19

Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?

Available Choices (select all choices that are correct)

Options:

A.

Aligned development process

B.

Aligned needs of industrial users

C.

Well-documented security policies and procedures

D.

Defense-in-depth approach to designing

Question 20

Which factor drives the selection of countermeasures?

Available Choices (select all choices that are correct)

Options:

A.

Foundational requirements

B.

Output from a risk assessment

C.

Security levels

D.

System design

Question 21

Which organization manages the ISASecure conformance certification program?

Available Choices (select all choices that are correct)

Options:

A.

American Society for Industrial Security

B.

Automation Federation

C.

National Institute of Standards and Technology

D.

Security Compliance Institute

Question 22

What are the four main categories for documents in the ISA-62443 (IEC 62443) series?

Available Choices (select all choices that are correct)

Options:

A.

General. Policies and Procedures. System, and Component

B.

End-User, Integrator, Vendor, and Regulator

C.

Assessment. Mitigation. Documentation, and Maintenance

D.

People. Processes. Technology, and Training

Question 23

Which is an important difference between IT systems and IACS?

Available Choices (select all choices that are correct)

Options:

A.

The IACS security priority is integrity.

B.

The IT security priority is availability.

C.

IACS cybersecurity must address safety issues.

D.

Routers are not used in IACS networks.

Question 24

What is a feature of an asymmetric key?

Available Choices (select all choices that are correct)

Options:

A.

Uses a continuous stream

B.

Uses different keys

C.

Shares the same key OD.

D.

Has lower network overhead

Question 25

What are the two sublayers of Layer 2?

Available Choices (select all choices that are correct)

Options:

A.

HIDS and NIDS

B.

LLC and MAC

C.

OPC and DCOM

D.

VLAN and VPN

Question 26

Which is a PRIMARY reason why network security is important in IACS environments?

Available Choices (select all choices that are correct)

Options:

A.

PLCs are inherently unreliable.

B.

PLCs are programmed using ladder logic.

C.

PLCs use serial or Ethernet communications methods.

D.

PLCs under cyber attack can have costly and dangerous impacts.

Demo: 26 questions
Total 88 questions