What are the two sublayers of Layer 2?
Available Choices (select all choices that are correct)
Safety management staff are stakeholders of what security program development?
Available Choices (select all choices that are correct)
Which analysis method is MOST frequently used as an input to a security risk assessment?
Available Choices (select all choices that are correct)
Which type of cryptographic algorithms requires more than one key?
Available Choices (select all choices that are correct)
Which statement is TRUE reqardinq application of patches in an IACS environment?
Available Choices (select all choices that are correct)
Which is a reason for
and physical security regulations meeting a mixed resistance?
Available Choices (select all choices that are correct)
What are the four main categories for documents in the ISA-62443 (IEC 62443) series?
Available Choices (select all choices that are correct)
Which communications system covers a large geographic area?
Available Choices (select all choices that are correct)
Which is an important difference between IT systems and IACS?
Available Choices (select all choices that are correct)
Which analysis method is MOST frequently used as an input to a security risk assessment?
Available Choices (select all choices that are correct)
Whose responsibility is it to determine the level of risk an organization is willing to tolerate?
Available Choices (select all choices that are correct)
Which is the implementation of PROFIBUS over Ethernet for non-safety-related communications?
Available Choices (select all choices that are correct)
What does Layer 1 of the ISO/OSI protocol stack provide?
Available Choices (select all choices that are correct)
How many element qroups are in the "Addressinq Risk" CSMS cateqorv?
Available Choices (select all choices that are correct)
Which is the PRIMARY reason why Modbus over Ethernet is easy to manaqe in a firewall?
Available Choices (select all choices that are correct)
In which layer is the physical address assigned?
Available Choices (select all choices that are correct)
What is a feature of an asymmetric key?
Available Choices (select all choices that are correct)
Electronic security, as defined in ANSI/ISA-99.00.01:2007. includes which of the following?
Available Choices (select all choices that are correct)
Which of the following refers to internal rules that govern how an organization protects critical system resources?
Available Choices (select all choices that are correct)
Which is a commonly used protocol for managing secure data transmission on the Internet?
Available Choices (select all choices that are correct)
At Layer 4 of the Open Systems Interconnection (OSI) model, what identifies the application that will handle a packet inside a host?
Available Choices (select all choices that are correct)
Which of the following is a trend that has caused a significant percentage of security vulnerabilities?
Available Choices (select all choices that are correct)
How many security levels are in the ISASecure certification program?
Available Choices (select all choices that are correct)
Which of the following is an activity that should trigger a review of the CSMS?
Available Choices (select all choices that are correct)
Why is OPC Classic considered firewall unfriendly?
Available Choices (select all choices that are correct)
Which is the PRIMARY objective when defining a security zone?
Available Choices (select all choices that are correct)