Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISA Cybersecurity ISA-IEC-62443 Questions and answers with ValidTests

Exam ISA-IEC-62443 All Questions
Exam ISA-IEC-62443 Premium Access

View all detail and faqs for the ISA-IEC-62443 exam

Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions
Questions # 61:

What is a feature of an asymmetric key?

Available Choices (select all choices that are correct)

Options:

A.

Uses a continuous stream

B.

Uses different keys

C.

Shares the same key OD.

D.

Has lower network overhead

Expert Solution
Questions # 62:

Which is the PRIMARY objective when defining a security zone?

Available Choices (select all choices that are correct)

Options:

A.

All assets in the zone must be from the same vendor.

B.

All assets in the zone must share the same security requirements.

C.

All assets in the zone must be at the same level in the Purdue model.

D.

All assets in the zone must be physically located in the same area.

Expert Solution
Questions # 63:

What type of attack is characterized by encrypting an organization’s data and demanding payment for restoration?

Options:

A.

Phishing

B.

Ransomware

C.

DDoS attack

D.

Malware variant

Expert Solution
Questions # 64:

What is the purpose of ISO/IEC 15408 (Common Criteria)?

Available Choices (select all choices that are correct)

Options:

A.

To define a security management organization

B.

To describe a process for risk management

C.

To define a product development evaluation methodology

D.

To describe what constitutes a secure product

Expert Solution
Questions # 65:

Which layer is responsible for error checking and MAC addressing?

Options:

A.

Network

B.

Transport

C.

Application

D.

Data link

Expert Solution
Questions # 66:

Which of the following is a recommended default rule for IACS firewalls?

Available Choices (select all choices that are correct)

Options:

A.

Allow all traffic by default.

B.

Allow IACS devices to access the Internet.

C.

Allow traffic directly from the IACS network to the enterprise network.

D.

Block all traffic by default.

Expert Solution
Questions # 67:

Which of the following is an example of a device used for intrusion detection?

Options:

A.

Router

B.

Switch

C.

Firewall

D.

Host-based IDS

Expert Solution
Questions # 68:

Which policies and procedures publication is titled Patch Manaqement in the IACS Environment?

Available Choices (select all choices that are correct)

Options:

A.

ISA-TR62443-2-3

B.

ISA-TR62443-1-4

C.

ISA-62443-3-3

D.

ISA-62443-4-2

Expert Solution
Questions # 69:

What.are the two elements of the risk analysis category of an IACS?

Available Choices (select all choices that are correct)

Options:

A.

Risk evaluation and risk identification

B.

Business rationale and risk reduction and avoidance

C.

Business rationale and risk identification and classification

D.

Business recovery and risk elimination or mitigation

Expert Solution
Questions # 70:

In an IACS system, a typical security conduit consists of which of the following assets?

Available Choices (select all choices that are correct)

Options:

A.

Controllers, sensors, transmitters, and final control elements

B.

Wiring, routers, switches, and network management devices

C.

Ferrous, thickwall, and threaded conduit including raceways

D.

Power lines, cabinet enclosures, and protective grounds

Expert Solution
Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions