Which organization manages the ISA Secure conformance certification program?

Which organization manages the ISA Secure conformance certification program? Available Choices (select all choices that are correct)A . American Society for Industrial Security B. Automation Federation C. National Institute of Standards and Technology D. Security Compliance InstituteView AnswerAnswer: D

August 9, 2023 No Comments READ MORE +

What is a feature of an asymmetric key?

What is a feature of an asymmetric key? Available Choices (select all choices that are correct)A . Uses a continuous stream B. Uses different keys C. Shares the same key OD. D. Has lower network overheadView AnswerAnswer: B

August 8, 2023 No Comments READ MORE +

Which is the PRIMARY objective when defining a security zone?

Which is the PRIMARY objective when defining a security zone? Available Choices (select all choices that are correct)A . All assets in the zone must be from the same vendor. B. All assets in the zone must share the same security requirements. C. All assets in the zone must be...

August 8, 2023 No Comments READ MORE +

Which communications system covers a large geographic area?

Which communications system covers a large geographic area? Available Choices (select all choices that are correct)A . Campus Area Network (CAN) B. Local Area Network (LAN) C. Storage Area Network D. Wide Area Network (WAN)View AnswerAnswer: D

August 7, 2023 No Comments READ MORE +

What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?

What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below? A . Control B. Protocol C. Transport D. UserView AnswerAnswer: C

August 7, 2023 No Comments READ MORE +

What are the four main categories for documents in the ISA-62443 (IEC 62443) series?

What are the four main categories for documents in the ISA-62443 (IEC 62443) series? Available Choices (select all choices that are correct)A . General. Policies and Procedures. System, and Component B. End-User, Integrator, Vendor, and Regulator C. Assessment. Mitigation. Documentation, and Maintenance D. People. Processes. Technology, and TrainingView AnswerAnswer: A

August 6, 2023 No Comments READ MORE +

Which analysis method is MOST frequently used as an input to a security risk assessment?

Which analysis method is MOST frequently used as an input to a security risk assessment? Available Choices (select all choices that are correct)A . Failure Mode and Effects Analysis B. Job Safety Analysis C. Process Hazard Analysis (PHA) D. System Safety Analysis(SSA)View AnswerAnswer: C

August 5, 2023 No Comments READ MORE +

Using the risk matrix below, what is the risk of a medium likelihood event with high consequence?

Using the risk matrix below, what is the risk of a medium likelihood event with high consequence? A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: B

August 5, 2023 No Comments READ MORE +

Which is an important difference between IT systems and IACS?

Which is an important difference between IT systems and IACS? Available Choices (select all choices that are correct)A . The IACS security priority is integrity. B. The IT security priority is availability. C. IACS cybersecurity must address safety issues. D. Routers are not used in IACS networks.View AnswerAnswer: C

August 4, 2023 No Comments READ MORE +

Safety management staff are stakeholders of what security program development?

Safety management staff are stakeholders of what security program development? Available Choices (select all choices that are correct)A . CSMS B. SPRP C. CSA D. ERMView AnswerAnswer: A

August 4, 2023 No Comments READ MORE +