Which of the following is an example of separation of duties as a part of system development and maintenance?

Which of the following is an example of separation of duties as a part of system development and maintenance? Available Choices (select all choices that are correct)A . Changes are approved by one party and implemented by another. B. Configuration settings are made by one party and self-reviewed using a...

September 13, 2023No CommentsREAD MORE +

Which of the following is a recommended default rule for IACS firewalls?

Which of the following is a recommended default rule for IACS firewalls? Available Choices (select all choices that are correct)A . Allow all traffic by default. B. Allow IACS devices to access the Internet. C. Allow traffic directly from the IACS network to the enterprise network. D. Block all traffic...

September 13, 2023No CommentsREAD MORE +

What is a feature of an asymmetric key?

What is a feature of an asymmetric key? Available Choices (select all choices that are correct)A . Uses a continuous stream B. Uses different keys C. Shares the same key OD. D. Has lower network overheadView AnswerAnswer: B

September 13, 2023No CommentsREAD MORE +

Which of the following is an industry sector-specific standard?

Which of the following is an industry sector-specific standard? Available Choices (select all choices that are correct)A . ISA-62443 (EC 62443) B. NIST SP800-82 C. API 1164 D. D. ISO 27001View AnswerAnswer: C

September 12, 2023No CommentsREAD MORE +

Which is the PRIMARY objective when defining a security zone?

Which is the PRIMARY objective when defining a security zone? Available Choices (select all choices that are correct)A . All assets in the zone must be from the same vendor. B. All assets in the zone must share the same security requirements. C. All assets in the zone must be...

September 12, 2023No CommentsREAD MORE +

How many element qroups are in the "Addressinq Risk" CSMS cateqorv?

How many element qroups are in the "Addressinq Risk" CSMS cateqorv? Available Choices (select all choices that are correct)A . 2 B. 3 C. 4 D. 5View AnswerAnswer: B

September 12, 2023No CommentsREAD MORE +

What are the four main categories for documents in the ISA-62443 (IEC 62443) series?

What are the four main categories for documents in the ISA-62443 (IEC 62443) series? Available Choices (select all choices that are correct)A . General. Policies and Procedures. System, and Component B. End-User, Integrator, Vendor, and Regulator C. Assessment. Mitigation. Documentation, and Maintenance D. People. Processes. Technology, and TrainingView AnswerAnswer: A

September 12, 2023No CommentsREAD MORE +

Which is a PRIMARY reason why network security is important in IACS environments?

Which is a PRIMARY reason why network security is important in IACS environments? Available Choices (select all choices that are correct)A . PLCs are inherently unreliable. B. PLCs are programmed using ladder logic. C. PLCs use serial or Ethernet communications methods. D. PLCs under cyber attack can have costly and...

September 10, 2023No CommentsREAD MORE +

What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?

What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)? Available Choices (select all choices that are correct)A . HTTPS B. IPSec C. MPLS D. SSHView AnswerAnswer: B

September 10, 2023No CommentsREAD MORE +

Using the risk matrix below, what is the risk of a medium likelihood event with high consequence?

Using the risk matrix below, what is the risk of a medium likelihood event with high consequence? A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: B

September 9, 2023No CommentsREAD MORE +