Pass the ISA Cybersecurity ISA-IEC-62443 Questions and answers with CertsForce

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

What is the FIRST step required in implementing ISO 27001?

Available Choices (select all choices that are correct)

Options:

A.

Create a security management organization.


B.

Define an information security policy.


C.

Implement strict security controls.


D.

Perform a security risk assessment.


Expert Solution
Questions # 32:

What does the abbreviation CSMS round in ISA 62443-2-1 represent?

Available Choices (select all choices that are correct)

Options:

A.

Control System Management System


B.

Control System Monitoring System


C.

Cyber Security Management System


D.

Cyber Security Monitoring System


Expert Solution
Questions # 33:

Why is patch management more difficult for IACS than for business systems?

Available Choices (select all choices that are correct)

Options:

A.

Overtime pay is required for technicians.


B.

Many more approvals are required.


C.

Patching a live automation system can create safety risks.


D.

Business systems automatically update.


Expert Solution
Questions # 34:

Which of the following PRIMARILY determines access privileges for user accounts?

Available Choices (select all choices that are correct)

Options:

A.

Users' desire for ease of use


B.

Authorization security policy


C.

Common practice


D.

Technical capability


Expert Solution
Questions # 35:

What is the formula for calculating risk?

Options:

A.

Risk = Likelihood + Consequence


B.

Risk = Threat - Vulnerability * Consequence


C.

Risk = Threat + Vulnerability + Consequence


D.

Risk = Threat * Vulnerability * Consequence


Expert Solution
Questions # 36:

In terms of availability requirements, how do IACS and IT differ?

Options:

A.

IACS tolerates occasional failures while IT does not.


B.

Rebooting is never acceptable in IT but tolerated in IACS.


C.

Both IACS and IT have the same availability requirements.


D.

Continuous operation is expected in IT while scheduled operation is sufficient for IACS.


Expert Solution
Questions # 37:

Which statement is TRUE regarding Intrusion Detection Systems (IDS)?

Available Choices (select all choices that are correct)

Options:

A.

Modern IDS recognize IACS devices by default.


B.

They are very inexpensive to design and deploy.


C.

They are effective against known vulnerabilities.


D.

They require a small amount of care and feeding


Expert Solution
Questions # 38:

Which is the BEST practice when establishing security zones?

Available Choices (select all choices that are correct)

Options:

A.

Security zones should contain assets that share common security requirements.


B.

Security zones should align with physical network segments.


C.

Assets within the same logical communication network should be in the same security zone.


D.

All components in a large or complex system should be in the same security zone.


Expert Solution
Questions # 39:

What does a demilitarized zone (DMZ) provide in network security?

Options:

A.

Secure data transfer


B.

Increased bandwidth


C.

Indirect access to the Internet


D.

Simplified security architecture


Expert Solution
Questions # 40:

Which layer in the Open Systems Interconnection (OSI) model would include the use of the File Transfer Protocol (FTP)?

Available Choices (select all choices that are correct)

Options:

A.

Application layer


B.

Data link layer


C.

Session layer


D.

Transport layer


Expert Solution
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions