Pass the ISA Cybersecurity ISA-IEC-62443 Questions and answers with CertsForce

Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following is a trend that has caused a significant percentage of security vulnerabilities?

Available Choices (select all choices that are correct)

Options:

A.

IACS developing into a network of air-gapped systems


B.

IACS evolving into a number of closed proprietary systems


C.

IACS using equipment designed for measurement and control


D.

IACS becoming integrated with business and enterprise systems


Expert Solution
Questions # 42:

What is recommended to use between the plant floor and the rest of the company networks?

Options:

A.

Hub


B.

Router


C.

Switch


D.

Firewall


Expert Solution
Questions # 43:

Which of the following is a cause for the increase in attacks on IACS?

Available Choices (select all choices that are correct)

Options:

A.

Use of proprietary communications protocols


B.

The move away from commercial off the shelf (COTS) systems, protocols, and networks


C.

Knowledge of exploits and tools readily available on the Internet


D.

Fewer personnel with system knowledge having access to IACS


Expert Solution
Questions # 44:

What programs are MOST effective if they are tailored to the audience, consistent with company policy, and communicated regularly?

Options:

A.

CSMS development programs


B.

Cybersecurity awareness programs


C.

Control systems adjustment programs


D.

ISCS cybersecurity certification programs


Expert Solution
Questions # 45:

Which is a role of the application layer?

Available Choices (select all choices that are correct)

Options:

A.

Includes protocols specific to network applications such as email, file transfer, and reading data registers in a PLC


B.

Includes user applications specific to network applications such as email, file transfer, and reading data registers in a PLC


C.

Provides the mechanism for opening, closing, and managing a session between end-user application processes


D.

Delivers and formats information, possibly with encryption and security


Expert Solution
Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions