Pass the ISA Cybersecurity ISA-IEC-62443 Questions and answers with CertsForce

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following ISA-99 (IEC 62443) Reference Model levels is named correctly?

Available Choices (select all choices that are correct)

Options:

A.

Level 1: Supervisory Control


B.

Level 2: Quality Control


C.

Level 3: Operations Management


D.

Level 4: Process


Expert Solution
Questions # 2:

How can defense in depth be achieved via security zones?

Options:

A.

By having zones within zones, or subzones, that provide layered security


B.

By having a zone edge that is using the security policies of the asset owner


C.

By having zones that are connected via conduits using the latest version of SSL


D.

By having zones that separate sensors from actuators, that provide layered security


Expert Solution
Questions # 3:

Which factor drives the selection of countermeasures?

Available Choices (select all choices that are correct)

Options:

A.

Foundational requirements


B.

Output from a risk assessment


C.

Security levels


D.

System design


Expert Solution
Questions # 4:

Which of the following is NOT a strategy for deploying a WAN?

Options:

A.

Internet


B.

Enterprise WANs


C.

Local area networks


D.

Carrier-managed WANs


Expert Solution
Questions # 5:

What are the three main components of the ISASecure Integrated Threat Analysis (ITA) Program?

Available Choices (select all choices that are correct)

Options:

A.

Software development security assurance, functional security assessment, and communications robustness testing


B.

Software robustness security testing, functional software assessment assurance, and essential security functionality assessment


C.

Communications robustness testing, functional security assurance, and software robustness communications


D.

Communication speed, disaster recovery, and essential security functionality assessment


Expert Solution
Questions # 6:

What is the name of the protocol that implements serial Modbus over Ethernet?

Available Choices (select all choices that are correct)

Options:

A.

MODBUS/CIP


B.

MODBUS/Ethernet


C.

MODBUS/Plus


D.

MODBUS/TCP


Expert Solution
Questions # 7:

What does the first group of the ISA/IEC 62443 series focus on?

Options:

A.

Policies and procedures


B.

System technology aspects


C.

General standards and reports


D.

Component security requirements


Expert Solution
Questions # 8:

Which layer deals with data format conversion and encryption?

Options:

A.

Session


B.

Data link


C.

Application


D.

Presentation


Expert Solution
Questions # 9:

Multiuser accounts and shared passwords inherently carry which of the followinq risks?

Available Choices (select all choices that are correct)

Options:

A.

Privilege escalation


B.

Buffer overflow


C.

Unauthorized access


D.

Race conditions


Expert Solution
Questions # 10:

What are the four documents that belong to the General category of the ISA-62443 (IEC 62443) series?

Options:

A.

Part 1-1: Terminology, concepts, and models; Part 1-2: Master glossary of terms and definitions; Part 1-3: Security program ratings; and Part 1-4: IACS security lifecycle and use cases


B.

Part 1-1: Terminology, concepts, and models; Part 1-2: Master glossary of terms and definitions; Part 1-3: Security technologies for IACS; and Part 1-4: IACS security lifecycle and use cases


C.

Part 1-1: Terminology, concepts, and models; Part 1-2: Master glossary of terms and definitions; Part 1-3: System security conformance metrics; and Part 1-4: IACS security lifecycle and use cases


D.

Part 1-1: Terminology, concepts, and models; Part 1-2: Master glossary of terms and definitions; Part 1-3: System security conformance metrics; and Part 1-4: Security program requirements for IACS service providers


Expert Solution
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions