Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the ISA Cybersecurity ISA-IEC-62443 Questions and answers with Dumpstech

Exam ISA-IEC-62443 Premium Access

View all detail and faqs for the ISA-IEC-62443 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which is the BEST deployment system for malicious code protection?

Available Choices (select all choices that are correct)

Options:

A.

Network segmentation

B.

IACS protocol converters

C.

Application whitelistinq (AWL) OD.

D.

Zones and conduits

Questions # 62:

Which of the following starts at a high level and includes all ANSI/ISA-95 Level 0,1,2,3,4 equipment and information systems?

Options:

A.

Zone model

B.

Asset model

C.

Reference model

D.

Reference architecture

Questions # 63:

Which of the following is NOT listed as a potential consequence of compromising IACS according to the ISA99 Committee scope?

Options:

A.

Losses

B.

Increased product sales

C.

Endangerment of public safety

D.

Loss of proprietary information

Questions # 64:

How can defense in depth be achieved via security zones?

Options:

A.

By having zones within zones, or subzones, that provide layered security

B.

By having a zone edge that is using the security policies of the asset owner

C.

By having zones that are connected via using the latest version of SSL

D.

By having zones that separate sensors from actuators, that provide layered security

Questions # 65:

According to ISA/IEC TR 62443-1-5, which documents can be referenced when creating a security profile?

Options:

A.

Only ISA/IEC 62443-3-3 and 4-1

B.

Only ISA/IEC 62443-1-1 and 1-2

C.

ISA/IEC 62443-2-1, 2-4, 3-3, 4-1, and 4-2

D.

Any cybersecurity standard outside the ISA/IEC 62443 series

Questions # 66:

In an IACS system, a typical security conduit consists of which of the following assets?

Options:

A.

Controllers, sensors, transmitters, and final control elements

B.

Wiring, routers, switches, and network management devices

C.

Ferrous, thickwall, and threaded conduit including raceways

D.

Power lines, cabinet enclosures, and protective grounds

Questions # 67:

Electronic security, as defined in ANSI/ISA-99.00.01:2007. includes which of the following?

Available Choices (select all choices that are correct)

Options:

A.

Security guidelines for the proper configuration of IACS computers and operating systems

B.

Computers, networks, operating systems, applications, and other programmable configurable components of the system

C.

Personnel, policies, and procedures related to the security of computers, networks. PLCs, and other programmable configurable components of the system

D.

Security guidelines for the proper configuration of IACS PLCs and other programmable configurable components of the system

Questions # 68:

Which of the following is an activity that should trigger a review of the CSMS?

Available Choices (select all choices that are correct)

Options:

A.

Budgeting

B.

New technical controls

C.

Organizational restructuring

D.

Security incident exposing previously unknown risk.

Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions