11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ISA-IEC-62443 Exam Dumps - ISA/IEC 62443 Cybersecurity Fundamentals Specialist

Question # 4

Which of the following tools has the potential for serious disruption of a control network and should not be used on a live system?

Available Choices (select all choices that are correct)

A.

Remote desktop

B.

Vulnerability scanner

C.

FTP

D.

Web browser

Full Access
Question # 5

Which policies and procedures publication is titled Patch Manaqement in the IACS Environment?

Available Choices (select all choices that are correct)

A.

ISA-TR62443-2-3

B.

ISA-TR62443-1-4

C.

ISA-62443-3-3

D.

ISA-62443-4-2

Full Access
Question # 6

Which of the following provides the overall conceptual basis in the design of an appropriate security program?

Available Choices (select all choices that are correct)

A.

Asset model

B.

Zone model

C.

Reference model

D.

Reference architecture

Full Access
Question # 7

What are three possible entry points (pathways) that could be used for launching a cyber attack?

Available Choices (select all choices that are correct)

A.

LAN, portable media, and wireless

B.

LAN, portable media, and hard drives

C.

LAN, power source, and wireless OD.

D.

LAN, WAN, and hard drive

Full Access
Question # 8

Which of the following ISA-99 (IEC 62443) Reference Model levels is named correctly?

Available Choices (select all choices that are correct)

A.

Level 1: Supervisory Control

B.

Level 2: Quality Control

C.

Level 3: Operations Management

D.

Level 4: Process

Full Access
Question # 9

Security Levels (SLs) are broken down into which three types?

Available Choices (select all choices that are correct)

A.

SL-1, SL-2, and SL-3

B.

Target.capability, and achieved

C.

Target.capability, and availability

D.

Target.capacity, and achieved

Full Access
Question # 10

Which steps are part of implementing countermeasures?

Available Choices (select all choices that are correct)

A.

Establish the risk tolerance and select common countermeasures.

B.

Establish the risk tolerance and update the business continuity plan.

C.

Select common countermeasures and update the business continuity plan.

D.

Select common countermeasures and collaborate with stakeholders.

Full Access
Question # 11

Which is a common pitfall when initiating a CSMS program?

Available Choices (select all choices that are correct)

A.

Organizational lack of communication

B.

Failure to relate to the mission of the organization

C.

Insufficient documentation due to lack of good follow-up

D.

Immediate jump into detailed risk assessment

Full Access
Question # 12

What are the three main components of the ISASecure Integrated Threat Analysis (ITA) Program?

Available Choices (select all choices that are correct)

A.

Software development security assurance, functional security assessment, and communications robustness testing

B.

Software robustness security testing, functional software assessment assurance, and essential security functionality assessment

C.

Communications robustness testing, functional security assurance, and software robustness communications

D.

Communication speed, disaster recovery, and essential security functionality assessment

Full Access
Question # 13

What are the connections between security zones called?

Available Choices (select all choices that are correct)

A.

Firewalls

B.

Tunnels

C.

Pathways

D.

Conduits

Full Access
Question # 14

Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?

Available Choices (select all choices that are correct)

A.

Forwards packets, including routing through intermediate routers

B.

Gives transparent transfer of data between end users

C.

Provides the rules for framing, converting electrical signals to data

D.

Handles the physics of getting a message from one device to another

Full Access
Question # 15

Which activity is part of establishing policy, organization, and awareness?

Available Choices (select all choices that are correct)

A.

Communicate policies.

B.

Establish the risk tolerance.

C.

Identify detailed vulnerabilities.

D.

Implement countermeasures.

Full Access
Question # 16

What is the definition of "defense in depth" when referring to

Available Choices (select all choices that are correct)

A.

Using countermeasures that have intrinsic technical depth.

B.

Aligning all resources to provide a broad technical gauntlet

C.

Requiring a minimum distance requirement between security assets

D.

Applying multiple countermeasures in a layered or stepwise manner

Full Access
Question # 17

Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?

Available Choices (select all choices that are correct)

A.

Aligned development process

B.

Aligned needs of industrial users

C.

Well-documented security policies and procedures

D.

Defense-in-depth approach to designing

Full Access
Question # 18

Which statement is TRUE reqardinq application of patches in an IACS environment?

Available Choices (select all choices that are correct)

A.

Patches should be applied as soon as they are available.

B.

Patches should be applied within one month of availability.

C.

Patches never should be applied in an IACS environment.

D.

Patches should be applied based on the organization's risk assessment.

Full Access
Question # 19

Why is patch management more difficult for IACS than for business systems?

Available Choices (select all choices that are correct)

A.

Overtime pay is required for technicians.

B.

Many more approvals are required.

C.

Patching a live automation system can create safety risks.

D.

Business systems automatically update.

Full Access
Question # 20

Which of the following is an example of separation of duties as a part of system development and maintenance?

Available Choices (select all choices that are correct)

A.

Changes are approved by one party and implemented by another.

B.

Configuration settings are made by one party and self-reviewed using a checklist.

C.

Developers write and then test their own code.

D.

Design and implementation are performed by the same team.

Full Access
Question # 21

Within the National Institute of Standards and Technoloqv Cybersecuritv Framework v1.0 (NIST CSF), what is the status of the ISA 62443 standards?

Available Choices (select all choices that are correct)

A.

They are used as informative references.

B.

They are used as normative references.

C.

They are under consideration for future use.

D.

They are not used.

Full Access
Question # 22

At Layer 4 of the Open Systems Interconnection (OSI) model, what identifies the application that will handle a packet inside a host?

Available Choices (select all choices that are correct)

A.

ATCP/UDP application ID

B.

A TCP/UDP host ID

C.

ATCP/UDP port number

D.

ATCP/UDP registry number

Full Access
Question # 23

Which of the following is a trend that has caused a significant percentage of security vulnerabilities?

Available Choices (select all choices that are correct)

A.

IACS developing into a network of air-gapped systems

B.

IACS evolving into a number of closed proprietary systems

C.

IACS using equipment designed for measurement and control

D.

IACS becoming integrated with business and enterprise systems

Full Access
Question # 24

Which of the following attacks relies on a human weakness to succeed?

Available Choices (select all choices that are correct)

A.

Denial-of-service

B.

Phishing

C.

Escalation-of-privileges

D.

Spoofing

Full Access
Question # 25

What is the FIRST step required in implementing ISO 27001?

Available Choices (select all choices that are correct)

A.

Create a security management organization.

B.

Define an information security policy.

C.

Implement strict security controls.

D.

Perform a security risk assessment.

Full Access
Question # 26

In an IACS system, a typical security conduit consists of which of the following assets?

Available Choices (select all choices that are correct)

A.

Controllers, sensors, transmitters, and final control elements

B.

Wiring, routers, switches, and network management devices

C.

Ferrous, thickwall, and threaded conduit including raceways

D.

Power lines, cabinet enclosures, and protective grounds

Full Access