Which of the following are the critical variables related to access control?
Available Choices (select all choices that are correct)
What are three possible entry points (pathways) that could be used for launching a cyber attack?
Available Choices (select all choices that are correct)
Which statement is TRUE reqardinq application of patches in an IACS environment?
Available Choices (select all choices that are correct)
Which of the following is an element of security policy, organization, and awareness?
Available Choices (select all choices that are correct)
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)?
Available Choices (select all choices that are correct)
Safety management staff are stakeholders of what security program development?
Available Choices (select all choices that are correct)
After receiving an approved patch from the JACS vendor, what is BEST practice for the asset owner to follow?
Which is the PRIMARY objective when defining a security zone?
Available Choices (select all choices that are correct)
Which is the PRIMARY reason why Modbus over Ethernet is easy to manaqe in a firewall?
Available Choices (select all choices that are correct)