Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISA Cybersecurity ISA-IEC-62443 Questions and answers with ValidTests

Exam ISA-IEC-62443 All Questions
Exam ISA-IEC-62443 Premium Access

View all detail and faqs for the ISA-IEC-62443 exam

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which protocol is commonly used for managing the security of message transmission on the Internet via web browsers?

Options:

A.

TLS

B.

L2TP

C.

PPTP

D.

IPsec

Expert Solution
Questions # 52:

What are the two sublayers of Layer 2?

Available Choices (select all choices that are correct)

Options:

A.

HIDS and NIDS

B.

LLC and MAC

C.

OPC and DCOM

D.

VLAN and VPN

Expert Solution
Questions # 53:

Which of the following tools has the potential for serious disruption of a control network and should not be used on a live system?

Available Choices (select all choices that are correct)

Options:

A.

Remote desktop

B.

Vulnerability scanner

C.

FTP

D.

Web browser

Expert Solution
Questions # 54:

In a defense-in-depth strategy, what is the purpose of role-based access control?

Available Choices (select all choices that are correct)

Options:

A.

Ensures that users can access systems from remote locations

B.

Ensures that users can access only certain devices on the network

C.

Ensures that users can access only the functions they need for their job

D.

Ensures that users correctly manage their username and password

Expert Solution
Questions # 55:

Which of the following BEST describes a control system?

Options:

A.

Actions to prevent loss of revenue

B.

Unauthorized modifications to data

C.

Hardware and software components of an IACS

D.

Measures taken to protect against unauthorized access

Expert Solution
Questions # 56:

Safety management staff are stakeholders of what security program development?

Available Choices (select all choices that are correct)

Options:

A.

CSMS

B.

SPRP

C.

CSA

D.

ERM

Expert Solution
Questions # 57:

Which layer in the Open Systems Interconnection (OSI) model would include the use of the File Transfer Protocol (FTP)?

Available Choices (select all choices that are correct)

Options:

A.

Application layer

B.

Data link layer

C.

Session layer

D.

Transport layer

Expert Solution
Questions # 58:

What is the definition of "defense in depth" when referring to

Available Choices (select all choices that are correct)

Options:

A.

Using countermeasures that have intrinsic technical depth.

B.

Aligning all resources to provide a broad technical gauntlet

C.

Requiring a minimum distance requirement between security assets

D.

Applying multiple countermeasures in a layered or stepwise manner

Expert Solution
Questions # 59:

What is recommended to use between the plant floor and the rest of the company networks?

Options:

A.

Hub

B.

Router

C.

Switch

D.

Firewall

Expert Solution
Questions # 60:

Which steps are part of implementing countermeasures?

Available Choices (select all choices that are correct)

Options:

A.

Establish the risk tolerance and select common countermeasures.

B.

Establish the risk tolerance and update the business continuity plan.

C.

Select common countermeasures and update the business continuity plan.

D.

Select common countermeasures and collaborate with stakeholders.

Expert Solution
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions