Pass the ISA Cybersecurity ISA-IEC-62443 Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

In an IACS system, a typical security conduit consists of which of the following assets?

Available Choices (select all choices that are correct)

Options:

A.

Controllers, sensors, transmitters, and final control elements


B.

Wiring, routers, switches, and network management devices


C.

Ferrous, thickwall, and threaded conduit including raceways


D.

Power lines, cabinet enclosures, and protective grounds


Expert Solution
Questions # 22:

Which is the PRIMARY reason why Modbus over Ethernet is easy to manaqe in a firewall?

Available Choices (select all choices that are correct)

Options:

A.

Modbus uses a single master to communicate with multiple slaves usinq simple commands.


B.

Modbus is a proprietary protocol that is widely supported by vendors.


C.

Modbus uses explicit source and destination IP addresses and a sinqle known TCP port.


D.

Modbus has no known security vulnerabilities, so firewall rules are simple to implement.


Expert Solution
Questions # 23:

What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?

Available Choices (select all choices that are correct)

Options:

A.

HTTPS


B.

IPSec


C.

MPLS


D.

SSH


Expert Solution
Questions # 24:

Which of the following is an element of security policy, organization, and awareness?

Available Choices (select all choices that are correct)

Options:

A.

Product development requirements


B.

Staff training and security awareness


C.

Technical requirement assessment


D.

Penetration testing


Expert Solution
Questions # 25:

Which of the following can be employed as a barrier device in a segmented network?

Available Choices (select all choices that are correct)

Options:

A.

Router


B.

Unmanaged switch


C.

VPN


D.

Domain controller


Expert Solution
Questions # 26:

Safety management staff are stakeholders of what security program development?

Available Choices (select all choices that are correct)

Options:

A.

CSMS


B.

SPRP


C.

CSA


D.

ERM


Expert Solution
Questions # 27:

How can Modbus be secured?

Options:

A.

By firewall


B.

By using a VPN


C.

By limiting user access


D.

By encrypting all data packets


Expert Solution
Questions # 28:

Which communications system covers a large geographic area?

Available Choices (select all choices that are correct)

Options:

A.

Campus Area Network (CAN)


B.

Local Area Network (LAN)


C.

Storage Area Network


D.

Wide Area Network (WAN)


Expert Solution
Questions # 29:

Which of the following provides the overall conceptual basis in the design of an appropriate security program?

Available Choices (select all choices that are correct)

Options:

A.

Asset model


B.

Zone model


C.

Reference model


D.

Reference architecture


Expert Solution
Questions # 30:

Who must be included in a training and security awareness program?

Available Choices (select all choices that are correct)

Options:

A.

Vendors and suppliers


B.

Employees


C.

All personnel


D.

Temporary staff


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions