Month End Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

ISA ISA-IEC-62443 ISA/IEC 62443 Cybersecurity Fundamentals Specialist Exam Practice Test

Page: 1 / 15
Total 151 questions

ISA/IEC 62443 Cybersecurity Fundamentals Specialist Questions and Answers

Question 1

Which of the following technologies is no longer considered secure?

Options:

A.

Secure Sockets Layer (SSL)

B.

Transport Layer Security (TLS)

C.

Digital Encryption Standard (DES)

D.

Advanced Encryption Standard (AES)

Question 2

What is recommended to use between the plant floor and the rest of the company networks?

Options:

A.

Hub

B.

Router

C.

Switch

D.

Firewall

Question 3

Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?

Available Choices (select all choices that are correct)

Options:

A.

Forwards packets, including routing through intermediate routers

B.

Gives transparent transfer of data between end users

C.

Provides the rules for framing, converting electrical signals to data

D.

Handles the physics of getting a message from one device to another

Question 4

Which of the following is a recommended default rule for IACS firewalls?

Available Choices (select all choices that are correct)

Options:

A.

Allow all traffic by default.

B.

Allow IACS devices to access the Internet.

C.

Allow traffic directly from the IACS network to the enterprise network.

D.

Block all traffic by default.

Question 5

Which of the following can be employed as a barrier device in a segmented network?

Available Choices (select all choices that are correct)

Options:

A.

Router

B.

Unmanaged switch

C.

VPN

D.

Domain controller

Question 6

In what step of the development process of the CSMS is “Establish purpose, organizational support, resources, and scope” taken care of?

Options:

A.

Initiate the CSMS program.

B.

Conduct an initial/high-level risk assessment.

C.

Create reference architecture.

D.

Establish policy, organization, and awareness.

Question 7

Multiuser accounts and shared passwords inherently carry which of the followinq risks?

Available Choices (select all choices that are correct)

Options:

A.

Privilege escalation

B.

Buffer overflow

C.

Unauthorized access

D.

Race conditions

Question 8

Which of the following is NOT a general class of firewalls?

Options:

A.

Packet filter

B.

Network monitor

C.

Application proxy

D.

Stateful inspection

Question 9

Which U.S. Department is responsible for the Chemical Facility Anti-Terrorism Standards (CFATS)?

Options:

A.

Department of Energy

B.

Nuclear Regulatory Commission

C.

Department of Homeland Security

D.

Transportation Security Administration

Question 10

What is a feature of an asymmetric key?

Available Choices (select all choices that are correct)

Options:

A.

Uses a continuous stream

B.

Uses different keys

C.

Shares the same key OD.

D.

Has lower network overhead

Question 11

Which of the following is a trend that has caused a significant percentage of security vulnerabilities?

Available Choices (select all choices that are correct)

Options:

A.

IACS developing into a network of air-gapped systems

B.

IACS evolving into a number of closed proprietary systems

C.

IACS using equipment designed for measurement and control

D.

IACS becoming integrated with business and enterprise systems

Question 12

What do the tiers in the NIST CSF represent?

Options:

A.

Stages of incident response

B.

Categories of cybersecurity threats

C.

An organization's cybersecurity profile

D.

Different types of cybersecurity software

Question 13

What is defined as the hardware and software components of an IACS?

Available Choices (select all choices that are correct)

Options:

A.

COTS software and hardware

B.

Electronic security

C.

Control system

D.

Cybersecuritv

Question 14

Which of the following is an element of monitoring and improving a CSMS?

Available Choices (select all choices that are correct)

Options:

A.

Increase in staff training and security awareness

B.

Restricted access to the industrial control system to an as-needed basis

C.

Significant changes in identified risk round in periodic reassessments

D.

Review of system logs and other key data files

Question 15

Within the National Institute of Standards and Technoloqv Cybersecuritv Framework v1.0 (NIST CSF), what is the status of the ISA 62443 standards?

Available Choices (select all choices that are correct)

Options:

A.

They are used as informative references.

B.

They are used as normative references.

C.

They are under consideration for future use.

D.

They are not used.

Question 16

Which organization manages the ISASecure conformance certification program?

Available Choices (select all choices that are correct)

Options:

A.

American Society for Industrial Security

B.

Automation Federation

C.

National Institute of Standards and Technology

D.

Security Compliance Institute

Question 17

Authorization (user accounts) must be granted based on which of the following?

Available Choices (select all choices that are correct)

Options:

A.

Individual preferences

B.

Common needs for large groups

C.

Specific roles

D.

System complexity

Question 18

Which policies and procedures publication is titled Patch Manaqement in the IACS Environment?

Available Choices (select all choices that are correct)

Options:

A.

ISA-TR62443-2-3

B.

ISA-TR62443-1-4

C.

ISA-62443-3-3

D.

ISA-62443-4-2

Question 19

Which is a role of the application layer?

Available Choices (select all choices that are correct)

Options:

A.

Includes protocols specific to network applications such as email, file transfer, and reading data registers in a PLC

B.

Includes user applications specific to network applications such as email, file transfer, and reading data registers in a PLC

C.

Provides the mechanism for opening, closing, and managing a session between end-user application processes

D.

Delivers and formats information, possibly with encryption and security

Question 20

How should CSMS organizational responsibilities or training be handled over time?

Options:

A.

They should be ignored.

B.

They should be evaluated.

C.

They should remain constant.

D.

They should be expanded indefinitely.

Question 21

What do packet filter firewalls examine?

Available Choices (select all choices that are correct)

Options:

A.

The packet structure and sequence

B.

The relationships between packets in a session

C.

Every incoming packet up to the application layer

D.

Only the source, destination, and ports in the header of each packet

Question 22

What is the primary audience for Part 2-5 of the ISA/IEC 62443 Series - Policies & Procedures group of standards?

Options:

A.

Asset owners

B.

Service providers

C.

Product suppliers

D.

System integrators

Question 23

Which part of the standard provides a list of possible Foundational Requirements to address assessed risks?

Options:

A.

ISA/IEC 62443-3-1

B.

ISA/IEC 62443-3-2

C.

ISA/IEC 62443-3-3

D.

ISA/IEC 62443-3-4

Question 24

Which of the following is an example of a device used for intrusion detection?

Options:

A.

Router

B.

Switch

C.

Firewall

D.

Host-based IDS

Question 25

What is one challenge associated with firewalls?

Options:

A.

Difficulty of installation

B.

Need for constant updates

C.

That they can only filter HTTP traffic

D.

Deciding how they should be configured

Question 26

What is the definition of "defense in depth" when referring to

Available Choices (select all choices that are correct)

Options:

A.

Using countermeasures that have intrinsic technical depth.

B.

Aligning all resources to provide a broad technical gauntlet

C.

Requiring a minimum distance requirement between security assets

D.

Applying multiple countermeasures in a layered or stepwise manner

Question 27

Which layer deals with data format conversion and encryption?

Options:

A.

Session

B.

Data link

C.

Application

D.

Presentation

Question 28

Which of the following PRIMARILY determines access privileges for user accounts?

Available Choices (select all choices that are correct)

Options:

A.

Users' desire for ease of use

B.

Authorization security policy

C.

Common practice

D.

Technical capability

Question 29

What are the four main categories for documents in the ISA-62443 (IEC 62443) series?

Available Choices (select all choices that are correct)

Options:

A.

General. Policies and Procedures. System, and Component

B.

End-User, Integrator, Vendor, and Regulator

C.

Assessment. Mitigation. Documentation, and Maintenance

D.

People. Processes. Technology, and Training

Question 30

Which of the following is the BEST reason for periodic audits?

Available Choices (select all choices that are correct)

Options:

A.

To confirm audit procedures

B.

To meet regulations

C.

To validate that security policies and procedures are performing

D.

To adhere to a published or approved schedule

Question 31

Why is OPC Classic considered firewall unfriendly?

Available Choices (select all choices that are correct)

Options:

A.

OPC Classic uses DCOM, which dynamically assigns any port between 1024 and 65535.

B.

OPC Classic is allowed to use only port 80.

C.

OPC Classic works with control devices from different manufacturers.

D.

OPC Classic is an obsolete communication standard.

Question 32

Which of the following provides the overall conceptual basis in the design of an appropriate security program?

Options:

A.

Asset model

B.

Zone model

C.

Reference model

D.

Reference architecture

Question 33

What impact do increasing cybercrime attacks have?

Options:

A.

They primarily target personal devices.

B.

They focus solely on financial institutions.

C.

They affect suppliers of essential services.

D.

They lead to improved cybersecurity measures.

Question 34

Which organization is responsible for the ISA 62443 series of standards?

Options:

A.

American National Standards Institute (ANSI)

B.

International Electrotechnical Commission (IEC)

C.

National Institute of Standards and Technology (NIST)

D.

European Telecommunications Standards Institute (ETSI)

Question 35

What are the connections between security zones called?

Available Choices (select all choices that are correct)

Options:

A.

Firewalls

B.

Tunnels

C.

Pathways

D.

Conduits

Question 36

What type of cyberattack was discussed in the Ukrainian power grid case study?

Options:

A.

Internal sabotage

B.

Nation state

C.

Insider threat

D.

Random hacking

Question 37

Which of the following staff is NOT mentioned as a stakeholder in the CSMS Program?

Options:

A.

Marketing

B.

Operations

C.

IT security

D.

Physical security

Question 38

Who must be included in a training and security awareness program?

Available Choices (select all choices that are correct)

Options:

A.

Vendors and suppliers

B.

Employees

C.

All personnel

D.

Temporary staff

Question 39

Which of the following attacks relies on a human weakness to succeed?

Available Choices (select all choices that are correct)

Options:

A.

Denial-of-service

B.

Phishing

C.

Escalation-of-privileges

D.

Spoofing

Question 40

Which is a PRIMARY reason why network security is important in IACS environments?

Available Choices (select all choices that are correct)

Options:

A.

PLCs are inherently unreliable.

B.

PLCs are programmed using ladder logic.

C.

PLCs use serial or Ethernet communications methods.

D.

PLCs under cyber attack can have costly and dangerous impacts.

Question 41

Whose responsibility is it to determine the level of risk an organization is willing to tolerate?

Available Choices (select all choices that are correct)

Options:

A.

Management

B.

Legal Department

C.

Operations Department

D.

Safety Department

Question 42

Which is the BEST practice when establishing security zones?

Available Choices (select all choices that are correct)

Options:

A.

Security zones should contain assets that share common security requirements.

B.

Security zones should align with physical network segments.

C.

Assets within the same logical communication network should be in the same security zone.

D.

All components in a large or complex system should be in the same security zone.

Question 43

Which of the following BEST describes a control system?

Options:

A.

Actions to prevent loss of revenue

B.

Unauthorized modifications to data

C.

Hardware and software components of an IACS

D.

Measures taken to protect against unauthorized access

Question 44

Which service does an Intrusion Detection System (IDS) provide?

Available Choices (select all choices that are correct)

Options:

A.

It is the lock on the door for networks and computer systems.

B.

It is effective against all vulnerabilities in networks and computer systems.

C.

It blocks malicious activity in networks and computer systems.

D.

It detects attempts to break into or misuse a computer system.

Question 45

The Risk Analysis category contains background information that is used where?

Available Choices (select all choices that are correct)

Options:

A.

Many other elements in the CSMS

B.

(Elements external to the CSMS

C.

Only the Assessment element

D.

Only the Risk ID element

Page: 1 / 15
Total 151 questions