Cyber Fundamentals Specialst Exam Bank
Cyber Fundamentals Specialst Exam Bank
q61
NEW QUESTION: 1
Which is the BEST practice when establishing security zones?
Available Choices (select all choices that are correct)
A. Security zones should contain assets that share common security requirements.
B. Security zones should align with physical network segments.
C. Assets within the same logical communication network should be in the same security zone.
D. All components in a large or complex system should be in the same security zone.
Answer: A (LEAVE A REPLY)
Security zones are logical groupings of assets that share common security requirements based on
factors such as criticality, consequence, vulnerability, and threat. Security zones are used to apply the
principle of defense in depth, which means creating multiple layers of protection to prevent or mitigate
cyberattacks. By creating security zones, asset owners can isolate the most critical or sensitive assets
from the less critical or sensitive ones, and apply different levels of security controls to each zone
according to the risk assessment. Security zones are not necessarily aligned with physical network
segments, as assets within the same network may have different security requirements. For example, a
network segment may contain both a safety instrumented system (SIS) and a human-machine interface
(HMI), but the SIS has a higher security requirement than the HMI. Therefore, the SIS and the HMI
should be in different security zones, even if they are in the same network segment. Similarly, assets
within the same logical communication network may not have the same security requirements, and
therefore should not be in the same security zone. For example, a logical communication network may
span across multiple physical locations, such as a plant and a corporate office, but the assets in the
plant may have higher security requirements than the assets in the office. Therefore, the assets in the
plant and the office should be in different security zones, even if they are in the same logical
communication network. Finally, all components in a large or complex system should not be in the same
security zone, as this would create a single point of failure and expose the entire system to potential
cyberattacks. Instead, the components should be divided into smaller and simpler security zones, based
on their security requirements, and the communication between the zones should be controlled by
conduits.
Conduits are logical or physical connections between security zones that allow data flow and access
control.
Conduits should be designed to minimize the attack surface and the potential impact of cyberattacks, by
applying security controls such as firewalls, encryption, authentication, and authorization. References:
* How to Define Zones and Conduits1
* Securing industrial networks: What is ISA/IEC 62443?2
* ISA/IEC 62443 Series of Standards3
NEW QUESTION: 2
Which of the following is the underlying protocol for Ethernet/IP?
Available Choices (select all choices that are correct)
A. Common Industrial Protocol
B. Building Automation and Control Network (BACnet)
C. Highway Addressable Remote Transducer (HART)
D. Object Linking and Embedding (OLE) for Process Control
Answer: A (LEAVE A REPLY)
NEW QUESTION: 3
What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?
A. Protocol
B. Control
C. User
D. Transport
Answer: D (LEAVE A REPLY)
NEW QUESTION: 4
Which is the implementation of PROFIBUS over Ethernet for non-safety-related communications?
Available Choices (select all choices that are correct)
A. PROFIBUS DP
B. PROFIBUS PA
C. PROFINET
D. PROF1SAFE
Answer: C (LEAVE A REPLY)
PROFINET is the implementation of PROFIBUS over Ethernet for non-safety-related communications. It
is a standard for industrial Ethernet that enables real-time data exchange between automation devices,
controllers, and higher-level systems. PROFINET uses standard Ethernet hardware and software, but
adds a thin software layer that allows deterministic and fast communication. PROFINET supports
different communication profiles for different applications, such as motion control, process automation,
and functional safety. PROFINET is compatible with PROFIBUS, and allows seamless integration of
existing PROFIBUS devices and networks123 References: 1: What is PROFINET? - PI North America 2:
PROFINET - Wikipedia 3: PROFINET Technology and Application - System Description
NEW QUESTION: 5
Within the National Institute of Standards and Technoloqv Cybersecuritv Framework v1.0 (NIST CSF),
what
is the status of the ISA 62443 standards?
Available Choices (select all choices that are correct)
A. They are not used.
B. They are under consideration for future use.
C. They are used as informative references.
D. They are used as normative references.
Answer: (SHOW ANSWER)
NEW QUESTION: 6
Which statement is TRUE reqardinq application of patches in an IACS environment?
Available Choices (select all choices that are correct)
A. Patches should be applied as soon as they are available.
B. Patches should be applied within one month of availability.
C. Patches never should be applied in an IACS environment.
D. Patches should be applied based on the organization's risk assessment.
Answer: D (LEAVE A REPLY)
Patches are software updates that fix bugs, vulnerabilities, or improve performance or functionality.
Patches are important for maintaining the security and reliability of an IACS environment, but they also
pose some challenges and risks. Applying patches in an IACS environment is not as simple as in an IT
environment, because patches may affect the availability, integrity, or safety of the IACS. Therefore,
patches should not be applied blindly or automatically, but based on the organization's risk assessment.
The risk assessment should consider the following factors: 1
* The severity and likelihood of the vulnerability that the patch addresses
* The impact of the patch on the IACS functionality and performance
* The compatibility of the patch with the IACS components and configuration
* The availability of a backup or recovery plan in case the patch fails or causes problems
* The testing and validation of the patch before applying it to the production system
* The communication and coordination with the stakeholders involved in the patching process
* The documentation and auditing of the patching activities and results References: ISA TR62443-2-3 -
Security for industrial automation and control systems, Part 2-3: Patch management in the IACS
environment
NEW QUESTION: 7
What are the connections between security zones called?
Available Choices (select all choices that are correct)
A. Firewalls
B. Tunnels
C. Pathways
D. Conduits
Answer: D (LEAVE A REPLY)
According to the ISA/IEC 62443 standard, the connections between security zones are called conduits.
A conduit is defined as a logical or physical grouping of communication channels connecting two or
more zones that share common security requirements. A conduit can be used to control and monitor the
data flow between zones, and to apply security measures such as encryption, authentication, filtering, or
logging. A conduit can also be used to isolate zones from each other in case of a security breach or
incident. A conduit can be implemented using various technologies, such as firewalls, routers, switches,
cables, or wireless links.
However, these technologies are not synonymous with conduits, as they are only components of a
conduit. A firewall, for example, can be used to create multiple conduits between different zones, or to
protect a single zone fromexternal threats. Therefore, the other options (firewalls, tunnels, and
pathways) are not correct names for the connections between security zones. References:
* ISA/IEC 62443-3-2:2016 - Security for industrial automation and control systems - Part 3-2: Security
risk assessment and system design1
* ISA/IEC 62443-3-3:2013 - Security for industrial automation and control systems - Part 3-3: System
security requirements and security levels2
* Zones and Conduits | Tofino Industrial Security Solution3
* Key Concepts of ISA/IEC 62443: Zones & Security Levels | Dragos4
NEW QUESTION: 8
Which of the following ISA-99 (IEC 62443) Reference Model levels is named correctly?
Available Choices (select all choices that are correct)
A. Level 3: Operations Management
B. Level 1: Supervisory Control
C. Level 4: Process
D. Level 2: Quality Control
Answer: (SHOW ANSWER)
NEW QUESTION: 9
Which communications system covers a large geographic area?
Available Choices (select all choices that are correct)
A. Campus Area Network (CAN)
B. Local Area Network (LAN)
C. Storage Area Network
D. Wide Area Network (WAN)
Answer: D (LEAVE A REPLY)
A Wide Area Network (WAN) is a communications system that covers a large geographic area, such as
a city, a country, or even several countries or continents1. WANs are often used to connect local area
networks (LANs) and other types of networks together, so that users and computers in one location can
communicate with users and computers in other locations2. WANs use various communication
infrastructures, such as public telephone lines, undersea cables, and communication satellites, to
transmit data over long distances1. WANs are typically established with leased telecommunication
circuits or less costly circuit switching or packet switching methods2. WANs are often built by Internet
service providers, who provide connections from an organization's LAN to the Internet2. The Internet
itself may be considered a WAN2. References: Hardware and network technologies - CCEA LAN and
WAN - BBC, Wide area network
- Wikipedia.
NEW QUESTION: 10
Which organization manages the ISASecure conformance certification program?
Available Choices (select all choices that are correct)
A. American Society for Industrial Security
B. Automation Federation
C. National Institute of Standards and Technology
D. Security Compliance Institute
Answer: D (LEAVE A REPLY)
The ISASecure conformance certification program is managed by the Security Compliance Institute
(ISCI), a non-profit organization established in 2007 by a group of industry stakeholders, including end
users, suppliers, and integrators. ISCI's mission is to provide a common industry-accepted set of device
and process requirements that drive device security, simplifying procurement for asset owners and
device assurance for equipment vendors12. References: 1: ISASecure - IEC 62443 Conformance
Certification - Official Site 2:
Certifications - ISASecure
NEW QUESTION: 11
Who must be included in a training and security awareness program?
Available Choices (select all choices that are correct)
A. Vendors and suppliers
B. Employees
C. All personnel
D. Temporary staff
Answer: C (LEAVE A REPLY)
Modbus over Ethernet, also known as Modbus/TCP, is a protocol that encapsulates the Modbus/RTU
data string inside the data section of the TCP frame. It then sets up a client/server exchange between
nodes, using TCP/IP addressing to establish connections1. This makes it easy to manage in a firewall,
because the firewall can filter the traffic based on the source and destination IP addresses and the TCP
port number. The default TCP port for Modbus/TCP is 502, but it can be changed if needed.
Modbus/TCP does not use any other ports or protocols, so the firewall rules can be simple and specific.
References:
* 8: Open Modbus/TCP Specification, RTA Automation, 2010.
* [9]: Modbus Application Protocol Specification V1.1b3, Modbus Organization, 2012.
NEW QUESTION: 12
Which is an important difference between IT systems and IACS?
Available Choices (select all choices that are correct)
A. The IT security priority is availability.
B. The IACS security priority is integrity.
C. Routers are not used in IACS networks.
D. IACS cybersecurity must address safety issues.
Answer: B,D (LEAVE A REPLY)
NEW QUESTION: 13
Which type of cryptographic algorithms requires more than one key?
Available Choices (select all choices that are correct)
A. Block ciphers
B. Stream ciphers
C. Symmetric (private) key
D. Asymmetric (public) key
Answer: (SHOW ANSWER)
NEW QUESTION: 14
Which of the following refers to internal rules that govern how an organization protects critical system
resources?
Available Choices (select all choices that are correct)
A. Security policy
D- Code of conduct
B. Formal guidance
C. Legislation
Answer: A (LEAVE A REPLY)
NEW QUESTION: 15
Which of the following provides the overall conceptual basis in the design of an appropriate security
program?
Available Choices (select all choices that are correct)
A. Reference architecture
B. Asset model
C. Reference model
D. Zone model
Answer: (SHOW ANSWER)
NEW QUESTION: 16
Which organization manages the ISASecure conformance certification program?
Available Choices (select all choices that are correct)
A. Security Compliance Institute
B. Automation Federation
C. American Society for Industrial Security
D. National Institute of Standards and Technology
Answer: (SHOW ANSWER)
NEW QUESTION: 17
What are the four main categories for documents in the ISA-62443 (IEC 62443) series?
Available Choices (select all choices that are correct)
A. General. Policies and Procedures. System, and Component
B. End-User, Integrator, Vendor, and Regulator
C. Assessment. Mitigation. Documentation, and Maintenance
D. People. Processes. Technology, and Training
Answer: A (LEAVE A REPLY)
The ISA/IEC 62443 series of standards is organized into four main categories for documents, based on
the topics and perspectives that they cover. These categories are: General, Policies and Procedures,
System, and Component12.
* General: This category covers topics that are common to the entire series, such as terms, concepts,
models, and overview of the standards1. For example, ISA/IEC 62443-1-1 defines the terminology,
concepts, and models for industrial automation and control systems (IACS) security3.
* Policies and Procedures: This category focuses on methods and processes associated with IACS
security, such as risk assessment, system design, security management, and security program
development1. For example, ISA/IEC 62443-2-1 specifies the elements of an IACS security
management system, which defines the policies, procedures, and practices to manage the security of
IACS4.
* System: This category is about requirements at the system level, such as security levels, security
zones, security lifecycle, and technical security requirements1. For example, ISA/IEC 62443-3-3
specifies the system security requirements and security levels for zones and conduits in an IACS5.
* Component: This category provides detailed requirements for IACS products, such as embedded
devices, network devices, software applications, and host devices1. For example, ISA/IEC 62443-4-2
specifies the technical security requirements for IACS components, such as identification and
authentication, access control, data integrity, and auditability.
The other options are not valid categories for documents in the ISA/IEC 62443 series of standards, as
they either do not reflect the structure and scope of the standards, or they mix different aspects of IACS
security that are covered by different categories. For example, end-user, integrator, vendor, and
regulator are not categories for documents, but rather roles or stakeholders that are involved in IACS
security. Assessment, mitigation, documentation, and maintenance are not categories for documents,
but rather activities or phases that are part of the IACS security lifecycle. People, processes, technology,
and training are not categories for documents, but rather elements or dimensions that are essential for
IACS security.
References:
* ISA/IEC 62443 Series of Standards - ISA1
* IEC 62443 - Wikipedia2
* ISA/IEC 62443-1-1: Concepts and models3
* ISA/IEC 62443-2-1: Security management system4
* ISA/IEC 62443-3-3: System security requirements and security levels5
* ISA/IEC 62443-4-2: Technical security requirements for IACS components
NEW QUESTION: 18
What.are the two elements of the risk analysis category of an IACS?
Available Choices (select all choices that are correct)
A. Risk evaluation and risk identification
B. Business rationale and risk reduction and avoidance
C. Business rationale and risk identification and classification
D. Business recovery and risk elimination or mitigation
Answer: C (LEAVE A REPLY)
The risk analysis category of an IACS consists of two elements: business rationale and risk identification
and classification1. Business rationale is the process of defining the scope, objectives, and criteria for
the risk analysis, as well as the roles and responsibilities of the stakeholders involved. Risk identification
and classification is the process of identifying the assets, threats, vulnerabilities, and consequences of a
cyberattack on the IACS, and assigning a risk level to each scenario based on the likelihood and impact
of the attack1. These elements are essential for establishing a baseline of the current risk posture of the
IACS and determining the appropriate risk treatment measures to reduce the risk to an acceptable level.
References: 1:
ISA/IEC 62443-3-2:2020, Security for industrial automation and control systems - Part 3-2: Security risk
assessment for system design, International Society of Automation, Research Triangle Park, NC, USA,
2020.
NEW QUESTION: 19
Which layer in the Open Systems Interconnection (OSI) model would include the use of the File Transfer
Protocol (FTP)?
Available Choices (select all choices that are correct)
A. Application layer
B. Data link layer
C. Session layer
D. Transport layer
Answer: A (LEAVE A REPLY)
The File Transfer Protocol (FTP) is an application layer protocol that moves files between local and
remote file systems. It runs on top of TCP, like HTTP. To transfer a file, 2 TCP connections are used by
FTP in parallel: control connection and data connection. The control connection is used to send
commands and responses between the client and the server, while the data connection is used to
transfer the actual file. FTP is one of the standard communication protocols defined by the TCP/IP
model and it does not fit neatly into the OSI model. However, since the OSI model is a reference model
that describes the general functions of each layer, FTP can be considered as an application layer
protocol in the OSI model, as it provides user services and interfaces to the network. The application
layer is the highest layer in the OSI model and it is responsible for providing various network services to
the users, such as email, web browsing, file transfer, remote login, etc.
The application layer interacts with the presentation layer, which is responsible for data formatting,
encryption, compression, etc. The presentation layer interacts with the session layer, which is
responsible for establishing, maintaining, and terminating sessions between applications. The session
layer interacts with the transport layer, which is responsible for reliable end-to-end data transfer and flow
control. The transport layer interacts with the network layer, which is responsible for routing and
addressing packets across different networks. The network layer interacts with the data link layer, which
is responsible for framing, error detection, and medium access control. The data link layer interacts with
the physical layer, which is responsible for transmitting and receiving bits over the physical medium.
References:
* File Transfer Protocol (FTP) in Application Layer1
* FTP Protocol2
* What OSI layer is FTP?3
NEW QUESTION: 20
Security Levels (SLs) are broken down into which three types?
Available Choices (select all choices that are correct)
A. Target.capacity, and achieved
B. Target.capability, and availability
C. SL-1, SL-2, and SL-3
D. Target.capability, and achieved
Answer: D (LEAVE A REPLY)
NEW QUESTION: 21
What does the abbreviation CSMS round in ISA 62443-2-1 represent?
Available Choices (select all choices that are correct)
A. Control System Management System
B. Control System Monitoring System
C. Cyber Security Management System
D. Cyber Security Monitoring System
Answer: (SHOW ANSWER)
The abbreviation CSMS stands for Cyber Security Management System in ISA 62443-2-1. This standard
defines the elements necessary to establish a CSMS for industrial automation and control systems
(IACS) and provides guidance on how to develop those elements123. A CSMS is a collection of policies,
procedures, practices, and personnel that are responsible for ensuring the security of IACS throughout
their lifecycle24. References: 1: ISA/IEC 62443 Series of Standards - ISA 2: ISA 62443-2-1 - Security for
industrial automation and control systems, Part 2-1: Establishing an Industrial Automation and Control
Systems Security Program | GlobalSpec 3: IEC 62443-2-1:2010 | IEC Webstore | cyber security, smart
city 4: Structuring the ISA/IEC 62443 Standards - ISAGCA
NEW QUESTION: 22
Electronic security, as defined in ANSI/ISA-99.00.01:2007. includes which of the following?
Available Choices (select all choices that are correct)
A. Security guidelines for the proper configuration of IACS PLCs and other programmable configurable
components of the system
B. Computers, networks, operating systems, applications, and other programmable configurable
components of the system
C. Personnel, policies, and procedures related to the security of computers, networks. PLCs, and other
programmable configurable components of the system
D. Security guidelines for the proper configuration of IACS computers and operating systems
Answer: C (LEAVE A REPLY)
NEW QUESTION: 23
Which is a commonly used protocol for managing secure data transmission on the Internet?
Available Choices (select all choices that are correct)
A. Secure Telnet
B. Microsoft Point-to-Point Encryption
C. Secure Sockets Layer
D. Datagram Transport Layer Security (DTLS)
Answer: (SHOW ANSWER)
NEW QUESTION: 24
Which is a physical layer standard for serial communications between two or more devices?
Available Choices (select all choices that are correct)
A. RS432
B. RS235
C. RS435
D. RS232
Answer: (SHOW ANSWER)
NEW QUESTION: 25
Which of the following provides the overall conceptual basis in the design of an appropriate security
program?
Available Choices (select all choices that are correct)
A. Asset model
B. Zone model
C. Reference model
D. Reference architecture
Answer: C (LEAVE A REPLY)
The reference model provides the overall conceptual basis in the design of an appropriate security
program. It defines the common terminology, concepts, and models that can be used by all stakeholders
responsible for IACS security. The reference model describes the general characteristics of IACS, the
typical threats and vulnerabilities, the security lifecycle phases, and the security levels. The reference
model also introduces the concepts of zones and conduits, which are used to group and isolate assets
with similar security requirements and to control the communication between them.
Referenceshttps://www.cisco.com/c/en/us/td/docs/solutions/Verticals/IoT_Security_Lab/IEC62443_WP.pd
https://www.cisco.com/c/en/us/td/docs/solutions/Verticals/IoT_Security_Lab/IEC62443_WP.pdf
NEW QUESTION: 26
At Layer 4 of the Open Systems Interconnection (OSI) model, what identifies the application that will
handle a
packet inside a host?
Available Choices (select all choices that are correct)
A. ATCP/UDP application ID
B. ATCP/UDP registry number
C. ATCP/UDP port number
D. A TCP/UDP host ID
Answer: C (LEAVE A REPLY)
NEW QUESTION: 27
Why is OPC Classic considered firewall unfriendly?
Available Choices (select all choices that are correct)
A. OPC Classic is an obsolete communication standard.
B. OPC Classic is allowed to use only port 80.
C. OPC Classic uses DCOM, which dynamically assigns any port between 1024 and 65535.
D. OPC Classic works with control devices from different manufacturers.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 28
What does Layer 1 of the ISO/OSI protocol stack provide?
Available Choices (select all choices that are correct)
A. User applications specific to network applications such as reading data registers in a PLC
B. The electrical and physical specifications of the data connection
C. Data encryption, routing, and end-to-end connectivity
D. Framing, converting electrical signals to data, and error checking
Answer: B (LEAVE A REPLY)
NEW QUESTION: 29
Which of the following can be employed as a barrier device in a segmented network?
Available Choices (select all choices that are correct)
A. Router
B. Unmanaged switch
C. VPN
D. Domain controller
Answer: A (LEAVE A REPLY)
A router and a VPN can be employed as barrier devices in a segmented network. A barrier device is a
device that controls the flow of traffic between different network segments, based on predefined rules
and policies1. A router is a device that forwards packets between different networks, based on their IP
addresses2. A router can act as a barrier device by applying access control lists (ACLs) or firewall rules
to filter or block unwanted or malicious traffic2. A VPN is a technology that creates a secure and
encrypted tunnel between different networks, such as a remote site and a corporate network3. A VPN
can act as a barrier device by encrypting the traffic and authenticating the users or devices that access
the network3. A VPN can also prevent unauthorized access or eavesdropping by outsiders3.
References: LAYERING NETWORK SECURITY - CISA, Router (computing) - Wikipedia, What Is
Network Segmentation? - Cisco.
NEW QUESTION: 30
Which communications system covers a large geographic area?
Available Choices (select all choices that are correct)
A. Local Area Network (LAN)
B. Storage Area Network
C. Campus Area Network (CAN)
D. Wide Area Network (WAN)
Answer: D (LEAVE A REPLY)
NEW QUESTION: 31
What do packet filter firewalls examine?
Available Choices (select all choices that are correct)
A. The packet structure and sequence
B. The relationships between packets in a session
C. Every incoming packet up to the application layer
D. Only the source, destination, and ports in the header of each packet
Answer: (SHOW ANSWER)
Packet filter firewalls, as defined by ISA/IEC 62443 standards on cybersecurity, primarily examine the
source, destination, and ports in the header of each packet. This type of firewall does not inspect the
packet content deeply (such as its structure or sequence) or maintain awareness of the relationships
between packets in a session. Instead, it operates at a more superficial level, filtering packets based
solely on IP addresses and TCP/UDP ports. This approach allows packet filter firewalls to quickly
process and either accept or block packets based on these predefined criteria without delving into the
complexities of session management or the content of the packets up to the application layer.
NEW QUESTION: 32
What is the name of the protocol that implements serial Modbus over Ethernet?
Available Choices (select all choices that are correct)
A. MODBUS/CIP
B. MODBUS/Ethernet
C. MODBUS/Plus
D. MODBUS/TCP
Answer: D (LEAVE A REPLY)
MODBUS/TCP is the name of the protocol that implements serial Modbus over Ethernet. MODBUS/TCP
is a variant of the Modbus protocol that uses the Transmission Control Protocol (TCP) as the transport
layer to encapsulate Modbus messages and send them over Ethernet networks. MODBUS/TCP
preserves the Modbus application layer and data model, which means that serial Modbus devices can
communicate with MODBUS/TCP devices through a gateway or a converter. MODBUS/TCP is widely
used in industrial automation and control systems, as it offers high performance, interoperability, and
compatibility with existing Modbus devices. References: ISA/IEC 62443 Cybersecurity Fundamentals
Specialist Study Guide, Section
3.1.21; MODBUS Application Protocol Specification V1.1b3, Section 1.1
NEW QUESTION: 33
Which is a reason for
and physical security regulations meeting a mixed resistance?
Available Choices (select all choices that are correct)
A. There are a limited number of enforced cybersecurity and physical security regulations.
B. Regulations are voluntary documents.
C. Regulations contain only informative elements.
D. Cybersecurity risks can best be managed individually and in isolation.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 34
Which is a common pitfall when initiating a CSMS program?
Available Choices (select all choices that are correct)
A. Organizational lack of communication
B. Failure to relate to the mission of the organization
C. Insufficient documentation due to lack of good follow-up
D. Immediate jump into detailed risk assessment
Answer: B (LEAVE A REPLY)
NEW QUESTION: 35
Which statement is TRUE regarding Intrusion Detection Systems (IDS)?
Available Choices (select all choices that are correct)
A. They are effective against known vulnerabilities.
B. They require a small amount of care and feeding
C. Modern IDS recognize IACS devices by default.
D. They are very inexpensive to design and deploy.
Answer: (SHOW ANSWER)
NEW QUESTION: 36
Authorization (user accounts) must be granted based on which of the following?
Available Choices (select all choices that are correct)
A. Common needs for large groups
B. Individual preferences
C. Specific roles
D. System complexity
Answer: C (LEAVE A REPLY)
NEW QUESTION: 37
Security Levels (SLs) are broken down into which three types?
Available Choices (select all choices that are correct)
A. SL-1, SL-2, and SL-3
B. Target.capability, and achieved
C. Target.capability, and availability
D. Target.capacity, and achieved
Answer: B (LEAVE A REPLY)
Security Levels (SLs) are a way of expressing the security performance of an industrial automation and
control system (IACS) or its components. SLs are broken down into three types: target, capability, and
achieved1.
* Target SL is the level of security performance that is required for a system or component to protect
against a specific threat scenario. The target SL is determined by conducting a risk assessment that
considers the likelihood and impact of potential security incidents1.
* Capability SL is the level of security performance that a system or component can provide based on its
design and implementation. The capability SL is determined by evaluating the security functions and
features of the system or component against a set of security requirements1.
* Achieved SL is the level of security performance that a system or component actually provides in its
operational environment. The achieved SL is determined by verifying that the system or component is
properly installed, configured, maintained, and monitored1.
References: ISA/IEC 62443 Standards to Secure Your Industrial Control System, page 3-4.
NEW QUESTION: 38
What is the FIRST step required in implementing ISO 27001?
Available Choices (select all choices that are correct)
A. Define an information security policy.
B. Create a security management organization.
C. Perform a security risk assessment.
D. Implement strict security controls.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 39
Which is the PRIMARY objective when defining a security zone?
Available Choices (select all choices that are correct)
A. All assets in the zone must be from the same vendor.
B. All assets in the zone must be at the same level in the Purdue model.
C. All assets in the zone must be physically located in the same area.
D. All assets in the zone must share the same security requirements.
Answer: D (LEAVE A REPLY)
NEW QUESTION: 40
Which of the following is a cause for the increase in attacks on IACS?
Available Choices (select all choices that are correct)
A. Use of proprietary communications protocols
B. The move away from commercial off the shelf (COTS) systems, protocols, and networks
C. Knowledge of exploits and tools readily available on the Internet
D. Fewer personnel with system knowledge having access to IACS
Answer: A,C (LEAVE A REPLY)
One of the reasons for the increase in attacks on IACS is the availability of information and tools that can
be used to exploit vulnerabilities in these systems. The Internet provides a platform for hackers,
researchers, and activists to share their knowledge and techniques for compromising IACS. Some
examples of such information and tools are:
* Stuxnet: A sophisticated malware that targeted the Iranian nuclear program in 2010. It exploited four
zero-day vulnerabilities in Windows and Siemens software to infect and manipulate the programmable
logic controllers (PLCs) that controlled the centrifuges. Stuxnet was widely analyzed and reported by the
media and security experts, and its source code was leaked online1.
* Metasploit: A popular penetration testing framework that contains modules for exploiting various IACS
components and protocols. For instance, Metasploit includes modules for attacking Modbus, DNP3,
OPC, and Siemens S7 devices2.
* Shodan: A search engine that allows users to find devices connected to the Internet, such as
webcams, routers, printers, and IACS components. Shodan can reveal the location, model, firmware,
and
* configuration of these devices, which can be used by attackers to identify potential targets and
vulnerabilities3.
* ICS-CERT: A website that provides alerts, advisories, and reports on IACS security issues and
incidents. ICS-CERT also publishes vulnerability notes and mitigation recommendations for various
IACS products and vendors4. These sources of information and tools can be useful for legitimate
purposes, such as security testing, research, and education, but they can also be misused by malicious
actors who want to disrupt, damage, or steal from IACS. Therefore, IACS owners and operators should
be aware of the threats and risks posed by the Internet and implement appropriate security measures to
protect their systems. References:
* The increase in attacks on Industrial Automation and Control Systems (IACS) can be attributed to
several factors, including: A.Use of proprietary communications protocols:These can pose security risks
because they may not have been designed with security in mind and are often not as well-tested against
security threats as more standard protocols. C.Knowledge of exploits and tools readily available on the
Internet:The availability of information about vulnerabilities and exploits on the internet has made it
easier for attackers to target IACS.
* The other options, B and D, are incorrect because: B. The move towards commercial off-the-shelf
(COTS) systems, protocols, and networks actually increases risk because these systems are more likely
to be known and targeted by attackers, compared to proprietary systems which might benefit from
security through obscurity. D. There is actually an increase in risk with more personnel with system
knowledge because it enlarges the attack surface - each individual with system knowledge can
potentially become a vector for an attack, either maliciously or accidentally.
NEW QUESTION: 41
What is the FIRST step required in implementing ISO 27001?
Available Choices (select all choices that are correct)
A. Create a security management organization.
B. Define an information security policy.
C. Implement strict security controls.
D. Perform a security risk assessment.
Answer: D (LEAVE A REPLY)
The first step in implementing ISO 27001, an international standard for information security management
systems (ISMS), is to perform a security risk assessment. This initial step is critical as it helps identify
the organization's information assets that could be at risk, assess the vulnerabilities and threats to these
assets, and evaluate their potential impacts. This risk assessment forms the foundation for defining
appropriate security controls and measures tailored to the organization's specific needs. Starting with a
risk assessment ensures that the security controls implemented are aligned with the actual risks the
organization faces, making the ISMS more effective and targeted.ISA/IEC 62443 Cybersecurity
Fundamentals References:
* Although ISO 27001 is not part of ISA/IEC 62443, it shares common principles in cybersecurity
management by starting with a comprehensive understanding and assessment of security risks, which is
a fundamental aspect in both standards for setting up effective security practices.
NEW QUESTION: 42
What type of security level defines what a component or system is capable of meeting?
Available Choices (select all choices that are correct)
A. Capability security level
B. Achieved security level
C. Design security level
D. Target security level
Answer: A (LEAVE A REPLY)
According to the IEC 62443 standard, a capability security level (SL-C) is defined as "the security level
that a component or system is capable of meeting when it is properly configured and protected by an
appropriate set of security countermeasures" 1. A component or system can have different SL-Cs for
different security requirements, depending on its design and implementation. The SL-C is determined by
testing the component or system against a set of security test cases that correspond to the security
requirements. The SL-C is not dependent on the actual operational environment orconfiguration of the
component or system, but rather on its inherent capabilities. References:
* IEC 62443 - Wikipedia
NEW QUESTION: 43
What are the two sublayers of Layer 2?
Available Choices (select all choices that are correct)
A. OPC and DCOM
B. LLC and MAC
C. HIDS and NIDS
D. VLAN and VPN
Answer: B (LEAVE A REPLY)
NEW QUESTION: 44
Which is the BEST practice when establishing security zones?
Available Choices (select all choices that are correct)
A. Assets within the same logical communication network should be in the same security zone.
B. All components in a large or complex system should be in the same security zone.
C. Security zones should contain assets that share common security requirements.
D. Security zones should align with physical network segments.
Answer: (SHOW ANSWER)
NEW QUESTION: 45
Which is a PRIMARY reason why network security is important in IACS environments?
Available Choices (select all choices that are correct)
A. PLCs are inherently unreliable.
B. PLCs are programmed using ladder logic.
C. PLCs use serial or Ethernet communications methods.
D. PLCs under cyber attack can have costly and dangerous impacts.
Answer: D (LEAVE A REPLY)
Network security is important in IACS environments because PLCs, or programmable logic controllers,
are devices that control physical processes and equipment in industrial settings. PLCs under cyber
attack can have costly and dangerous impacts, such as disrupting production, damaging equipment,
compromising safety, and harming the environment. Therefore, network security is essential to protect
PLCs and other IACS components from unauthorized access, modification, or disruption. The other
choices are not primary reasons why network security is important in IACS environments. PLCs are not
inherently unreliable, but they can be affected by environmental factors, such as temperature, humidity,
and electromagnetic interference. PLCs are programmed using ladder logic, which is a graphical
programming language that resembles electrical schematics. PLCs use serial or Ethernet
communications methods, depending on the type and age of the device, to communicate with other
IACS components, such as human-machine interfaces (HMIs), supervisory control and data acquisition
(SCADA) systems, and distributed control systems (DCSs). References:
* ISA/IEC 62443 Standards to Secure Your Industrial Control System training course1
* ISA/IEC 62443 Cybersecurity Fundamentals Specialist Study Guide2
* Using the ISA/IEC 62443 Standard to Secure Your Control Systems3
NEW QUESTION: 46
Which of the following is a trend that has caused a significant percentage of security vulnerabilities?
Available Choices (select all choices that are correct)
A. IACS developing into a network of air-gapped systems
B. IACS evolving into a number of closed proprietary systems
C. IACS using equipment designed for measurement and control
D. IACS becoming integrated with business and enterprise systems
Answer: (SHOW ANSWER)
One of the trends that has increased the security risks for industrial automation and control systems
(IACS) is the integration of these systems with business and enterprise systems, such asenterprise
resource planning (ERP), manufacturing execution systems (MES), and supervisory control and data
acquisition (SCADA). This integration exposes the IACS to the same threats and vulnerabilities that
affect the business and enterprise systems, such as malware, denial-of-service attacks, unauthorized
access, and data theft. Moreover, the integration also creates new attack vectors and pathways for
adversaries to compromise the IACS, such as through remote access, wireless networks, or third-party
devices. Therefore, the integration of IACS with business and enterprise systems is a trend that has
caused a significant percentage of security vulnerabilities. References: ISA/IEC 62443 Standards to
Secure Your Industrial Control System, page 1-2.
NEW QUESTION: 47
Which characteristic is MOST closely associated with the deployment of a demilitarized zone (DMZ)?
Available Choices (select all choices that are correct)
A. Level 4 systems must use the DMZ to communicate with Level 3 and below.
B. Internet access through the firewall is allowed.
C. Level 0 can only interact with Level 1 through the firewall.
D. Email is prevented, thereby mitigating the risk of phishing attempts.
Answer: (SHOW ANSWER)
NEW QUESTION: 48
Which of the following can be employed as a barrier device in a segmented network?
Available Choices (select all choices that are correct)
A. Domain controller
B. Router
C. Unmanaged switch
D. VPN
Answer: B (LEAVE A REPLY)
NEW QUESTION: 49
Which of the following is the underlying protocol for Ethernet/IP?
Available Choices (select all choices that are correct)
A. Building Automation and Control Network (BACnet)
B. Common Industrial Protocol
C. Highway Addressable Remote Transducer (HART)
D. Object Linking and Embedding (OLE) for Process Control
Answer: B (LEAVE A REPLY)
Ethernet/IP is an industrial network protocol that adapts the Common Industrial Protocol (CIP) to
standard Ethernet. CIP is an object-oriented protocol that provides a unified communication architecture
for various industrial automation applications, such as control, safety, security, energy, synchronization
and motion, information and network management. CIP defines a set of messages and services for
interacting with devices and data on the network, as well as a set of device profiles for consistent
implementation of automation functions across different products. Ethernet/IP uses the transport and
control protocols of standard Ethernet, such as TCP/IP and IEEE 802.3, to define the features and
functions for its lower layers. Ethernet/IP also uses UDP to transport I/O messages and supports various
network topologies, such as star, linear, ring and wireless.
Ethernet/IP is one of the leading industrial protocols in the United States and is widely used in a range of
industries, such as factory, hybrid and process. Ethernet/IP is managed by ODVA, Inc., a global trade
and standards development organization. References:
* EtherNet/IP - Wikipedia
* EtherNet/IP | ODVA Technologies | Industrial Automation
NEW QUESTION: 50
Using the risk matrix below, what is the risk of a medium likelihood event with high consequence?
A. Option D
B. Option C
C. Option A
D. Option B
Answer: (SHOW ANSWER)
NEW QUESTION: 51
Which steps are part of implementing countermeasures?
Available Choices (select all choices that are correct)
A. Select common countermeasures and update the business continuity plan.
B. Establish the risk tolerance and select common countermeasures.
C. Establish the risk tolerance and update the business continuity plan.
D. Select common countermeasures and collaborate with stakeholders.
Answer: (SHOW ANSWER)
NEW QUESTION: 52
Which layer specifies the rules for Modbus Application Protocol
Available Choices (select all choices that are correct)
A. Data link layer
B. Session layer
C. Presentation layer
D. Application layer
Answer: (SHOW ANSWER)
The Modbus Application Protocol is a messaging protocol that provides client/server communication
between devices connected on different types of buses or networks. It is positioned at level 7 of the OSI
model, which is the application layer. The application layer is the highest level of the OSI model and
defines the rules and formats for data exchange between applications. The Modbus Application Protocol
is independent of the underlying communication layers and can be implemented using different transport
protocols, such as TCP/IP, serial, or Modbus Plus. The Modbus Application Protocoldefines the function
codes, data formats, and error codes for Modbus transactions123 References:
* MODBUS APPLICATION PROTOCOL SPECIFICATION V1
* Modbus - Wikipedia
* Overview of Modbus - EPICS support for Modbus - GitHub Pages
NEW QUESTION: 53
Which layer specifies the rules for Modbus Application Protocol
Available Choices (select all choices that are correct)
A. Data link layer
B. Application layer
C. Session layer
D. Presentation layer
Answer: B (LEAVE A REPLY)
NEW QUESTION: 54
What is defined as the hardware and software components of an IACS?
Available Choices (select all choices that are correct)
A. COTS software and hardware
B. Electronic security
C. Control system
D. Cybersecuritv
Answer: C (LEAVE A REPLY)
According to the ISA/IEC 62443-1-1 standard, an industrial automation and control system (IACS) is
defined as a collection of personnel, hardware, and software that can affect or influence the safe,
secure, and reliable operation of an industrial process. The hardware and software components of an
IACS include the control system, which is the combination of control devices, networks, and applications
that perform the control functions for the industrial process. The control system may consist of various
types of devices, such as distributed control systems (DCS), programmable logic controllers (PLC),
supervisory control and data acquisition (SCADA) systems, human-machine interfaces (HMI), remote
terminal units (RTU), intelligent electronic devices (IED), sensors, actuators, and other field devices. The
control system may also use commercial off-the-shelf (COTS) software and hardware, such as operating
systems, databases, firewalls, routers, switches, and servers, to support the control functions and
communication.
References:
* ISA/IEC 62443-1-1:2009, Security for industrial automation and control systems - Part 1-1:
Terminology, concepts and models, Clause 3.2.11
* ISA/IEC 62443-2-1:2010, Security for industrial automation and control systems - Part 2-1: Establishing
an industrial automation and control systems security program, Clause 3.2.12
NEW QUESTION: 55
What type of security level defines what a component or system is capable of meeting?
Available Choices (select all choices that are correct)
A. Capability security level
B. Design security level
C. Achieved security level
D. Target security level
Answer: A (LEAVE A REPLY)
NEW QUESTION: 56
Which of the following is an activity that should trigger a review of the CSMS?
Available Choices (select all choices that are correct)
A. Organizational restructuring
B. New technical controls
C. Security incident exposing previously unknown risk.
D. Budgeting
Answer: A,B,C (LEAVE A REPLY)
According to the ISA/IEC 62443-2-1 standard, a review of the CSMS should be triggered by any
changes that affect the cybersecurity risk of the industrial automation and control system (IACS), such
as new technical controls, organizational restructuring, or security incidents1. Budgeting is not a trigger
for CSMS review, unless it impacts the cybersecurity risk level or the CSMS itself2. References: 1:
ISA/IEC 62443-2-1:2010, Section 4.3.3.3 2: A Practical Approach to Adopting the IEC 62443 Standards,
ISAGCA Blog3
NEW QUESTION: 57
Which analysis method is MOST frequently used as an input to a security risk assessment?
Available Choices (select all choices that are correct)
A. System Safety Analysis(SSA)
B. Job Safety Analysis(JSA)
C. Failure Mode and Effects Analysis
D. Process Hazard Analysis (PHA)
Answer: D (LEAVE A REPLY)
NEW QUESTION: 58
Which of the following are the critical variables related to access control?
Available Choices (select all choices that are correct)
A. Password strength and change frequency
B. Account management and password strength
C. Account management and monitoring
D. Reporting and monitoring
Answer: (SHOW ANSWER)
NEW QUESTION: 59
Which of the following is an example of separation of duties as a part of system development and
maintenance?
Available Choices (select all choices that are correct)
A. Developers write and then test their own code.
B. Design and implementation are performed by the same team.
C. Changes are approved by one party and implemented by another.
D. Configuration settings are made by one party and self-reviewed using a checklist.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 60
What are the connections between security zones called?
Available Choices (select all choices that are correct)
A. Pathways
B. Conduits
C. Firewalls
D. Tunnels
Answer: B (LEAVE A REPLY)
NEW QUESTION: 61
Which is the PRIMARY reason why Modbus over Ethernet is easy to manaqe in a firewall?
Available Choices (select all choices that are correct)
A. Modbus uses explicit source and destination IP addresses and a sinqle known TCP port.
B. Modbus uses a single master to communicate with multiple slaves usinq simple commands.
C. Modbus has no known security vulnerabilities, so firewall rules are simple to implement.
D. Modbus is a proprietary protocol that is widely supported by vendors.
Answer: (SHOW ANSWER)