Uploaded by christin.gat2010

ISA-IEC-62443 Cybersecurity Fundamentals Specialist Exam Dumps

advertisement
ISA-IEC-62443
Exam Dumps
https://www.certspots.com/exam/isa-iec-62443/
ISA-IEC-62443 Exam Dumps
1. Which of the following is an element of monitoring and improving a CSMS?
(select all choices that are correct)
A. Increase in staff training and security awareness
B. Restricted access to the industrial control system to an as-needed basis
C. Significant changes in identified risk round in periodic reassessments
D. Review of system logs and other key data files
Answer: D
ISA-IEC-62443 Exam Dumps
2. Which of the following attacks relies on a human weakness to
succeed? (select all choices that are correct)
A. Denial-of-service
B. Phishing
C. Escalation-of-privileges
D. Spoofing
Answer: B
ISA-IEC-62443 Exam Dumps
3. What is a feature of an asymmetric key? (select all choices that are
correct)
A. Uses a continuous stream
B. Uses different keys
C. Shares the same key OD.
D. Has lower network overhead
Answer: B
ISA-IEC-62443 Exam Dumps
4. Which of the following is a cause for the increase in attacks on IACS?
(select all choices that are correct)
A. Use of proprietary communications protocols
B. The move away from commercial off the shelf (COTS) systems,
protocols, and networks
C. Knowledge of exploits and tools readily available on the Internet
D. Fewer personnel with system knowledge having access to IACS
Answer: B
ISA-IEC-62443 Exam Dumps
5. Which is an important difference between IT systems and IACS?
(select all choices that are correct)
A. The IACS security priority is integrity.
B. The IT security priority is availability.
C. IACS cybersecurity must address safety issues.
D. Routers are not used in IACS networks.
Answer: C
ISA-IEC-62443 Exam Dumps
6. What are the four main categories for documents in the ISA-62443
(IEC 62443) series? (select all choices that are correct)
A. General. Policies and Procedures. System, and Component
B. End-User, Integrator, Vendor, and Regulator
C. Assessment. Mitigation. Documentation, and Maintenance
D. People. Processes. Technology, and Training
Answer: A
ISA-IEC-62443 Exam Dumps
7. What does the abbreviation CSMS round in ISA 62443-2-1 represent?
(select all choices that are correct)
A. Control System Management System
B. Control System Monitoring System
C. Cyber Security Management System
D. Cyber Security Monitoring System
Answer: C
ISA-IEC-62443 Exam Dumps
8. Which organization manages the ISA Secure conformance
certification program? (select all choices that are correct)
A. American Society for Industrial Security
B. Automation Federation
C. National Institute of Standards and Technology
D. Security Compliance Institute
Answer: D
ISA-IEC-62443 Exam Dumps
9. Which steps are included in the ISA/IEC 62443 assess phase? (select all
choices that are correct)
A. Cybersecurity requirements specification and detailed cyber risk
assessment
B. Cybersecurity requirements specification and allocation of IACS assets to
zones and conduits
C. Detailed cyber risk assessment and cybersecurity maintenance, monitoring,
and management of change
D. Allocation of IACS assets to zones and conduits, and detailed cyber risk
assessment
Answer: B
ISA-IEC-62443 Exam Dumps
10. Which analysis method is MOST frequently used as an input to a
security risk assessment? (select all choices that are correct)
A. Failure Mode and Effects Analysis
B. Job Safety Analysis
C. Process Hazard Analysis (PHA)
D. System Safety Analysis(SSA)
Answer: C
Download