Pass the ISA Cybersecurity ISA-IEC-62443 Questions and answers with CertsForce

Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions
Questions # 11:

In the context of global frameworks, what does the acronym SDO stand for?

Options:

A.

Security Development Organization


B.

Software Development Organization


C.

Systematic Development Organization


D.

Standards Development Organization


Expert Solution
Questions # 12:

Which of the following technologies is no longer considered secure?

Options:

A.

Secure Sockets Layer (SSL)


B.

Transport Layer Security (TLS)


C.

Digital Encryption Standard (DES)


D.

Advanced Encryption Standard (AES)


Expert Solution
Questions # 13:

What is the primary purpose of the NIST Cybersecurity Framework (CSF)?

Options:

A.

To create new cybersecurity technologies


B.

To replace existing cybersecurity standards


C.

To enhance the resilience of critical infrastructure


D.

To provide a certification program for organizations


Expert Solution
Questions # 14:

Why is OPC Classic considered firewall unfriendly?

Available Choices (select all choices that are correct)

Options:

A.

OPC Classic uses DCOM, which dynamically assigns any port between 1024 and 65535.


B.

OPC Classic is allowed to use only port 80.


C.

OPC Classic works with control devices from different manufacturers.


D.

OPC Classic is an obsolete communication standard.


Expert Solution
Questions # 15:

Which of the ISA 62443 standards focuses on the process of developing secure products?

Available Choices (select all choices that are correct)

Options:

A.

62443-1-1


B.

62443-3-2


C.

62443-3-3


D.

62443-4-1


Expert Solution
Questions # 16:

Which layer specifies the rules for Modbus Application Protocol

Available Choices (select all choices that are correct)

Options:

A.

Data link layer


B.

Session layer


C.

Presentation layer


D.

Application layer


Expert Solution
Questions # 17:

Which of the following is an example of separation of duties as a part of system development and maintenance?

Available Choices (select all choices that are correct)

Options:

A.

Changes are approved by one party and implemented by another.


B.

Configuration settings are made by one party and self-reviewed using a checklist.


C.

Developers write and then test their own code.


D.

Design and implementation are performed by the same team.


Expert Solution
Questions # 18:

Which of the following attacks relies on a human weakness to succeed?

Available Choices (select all choices that are correct)

Options:

A.

Denial-of-service


B.

Phishing


C.

Escalation-of-privileges


D.

Spoofing


Expert Solution
Questions # 19:

What is Modbus?

Options:

A.

A programming language


B.

A network security standard


C.

A type of industrial machinery


D.

A serial communications protocol


Expert Solution
Questions # 20:

Which of the following starts at a high level and includes all ANSI/ISA-95 Level 0,1,2,3,4 equipment and information systems?

Options:

A.

Zone model


B.

Asset model


C.

Reference model


D.

Reference architecture


Expert Solution
Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions