Practice Free ISA-IEC-62443 Exam Online Questions
Which of the following is an element of monitoring and improving a CSMS?
Available Choices (select all choices that are correct)
- A . Increase in staff training and security awareness
- B . Restricted access to the industrial control system to an as-needed basis
- C . Significant changes in identified risk round in periodic reassessments
- D . Review of system logs and other key data files
What are three possible entry points (pathways) that could be used for launching a cyber attack? Available Choices (select all choices that are correct)
- A . LAN, portable media, and wireless
- B . LAN, portable media, and hard drives
- C . LAN, power source, and wireless OD.
- D . LAN, WAN, and hard drive
How many element qroups are in the "Addressinq Risk" CSMS cateqorv?
Available Choices (select all choices that are correct)
- A . 2
- B . 3
- C . 4
- D . 5
In which layer is the physical address assigned?
Available Choices (select all choices that are correct)
- A . Layer 1
- B . Layer 2
- C . Layer 3
- D . Layer 7
Authorization (user accounts) must be granted based on which of the following?
Available Choices (select all choices that are correct)
- A . Individual preferences
- B . Common needs for large groups
- C . Specific roles
- D . System complexity
Which of the following is the BEST reason for periodic audits?
Available Choices (select all choices that are correct)
- A . To confirm audit procedures
- B . To meet regulations
- C . To validate that security policies and procedures are performing
- D . To adhere to a published or approved schedule
Which is a reason for and physical security regulations meeting a mixed resistance?
Available Choices (select all choices that are correct)
- A . Regulations are voluntary documents.
- B . Regulations contain only informative elements.
- C . Cybersecurity risks can best be managed individually and in isolation.
- D . There are a limited number of enforced cybersecurity and physical security regulations.
What.are the two elements of the risk analysis category of an IACS?
Available Choices (select all choices that are correct)
- A . Risk evaluation and risk identification
- B . Business rationale and risk reduction and avoidance
- C . Business rationale and risk identification and classification
- D . Business recovery and risk elimination or mitigation
What are the connections between security zones called?
Available Choices (select all choices that are correct)
- A . Firewalls
- B . Tunnels
- C . Pathways
- D . Conduits
Which layer specifies the rules for Modbus Application Protocol Available Choices (select all choices that are correct)
- A . Data link layer
- B . Session layer
- C . Presentation layer
- D . Application layer