Logo Passei Direto
Material
Study with thousands of resources!

Text Material Preview

ISA-IEC-62443
Exam Name: ISA/IEC 62443 Cybersecurity
Fundamentals Specialist
Full version: 88 Q&As
Full version of ISA-IEC-62443 Dumps
Share some ISA-IEC-62443 exam dumps
below.
1. Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
 1 / 6
https://www.certqueen.com/ISA-IEC-62443.html
A. Denial-of-service
B. Phishing
C. Escalation-of-privileges
D. Spoofing
Answer: B
2. Which is the BEST deployment system for malicious code protection?
Available Choices (select all choices that are correct)
A. Network segmentation
B. IACS protocol converters
C. Application whitelistinq (AWL) OD.
D. Zones and conduits
Answer: D
3. Multiuser accounts and shared passwords inherently carry which of the followinq risks?
Available Choices (select all choices that are correct)
A. Privilege escalation
B. Buffer overflow
C. Unauthorized access
D. Race conditions
Answer: A
4. Using the risk matrix below, what is the risk of a medium likelihood event with high
consequence?
 2 / 6
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
5. Why is OPC Classic considered firewall unfriendly?
Available Choices (select all choices that are correct)
A. OPC Classic uses DCOM, which dynamically assigns any port between 1024 and 65535.
B. OPC Classic is allowed to use only port 80.
C. OPC Classic works with control devices from different manufacturers.
D. OPC Classic is an obsolete communication standard.
Answer: A
6. Authorization (user accounts) must be granted based on which of the following?
Available Choices (select all choices that are correct)
A. Individual preferences
B. Common needs for large groups
C. Specific roles
D. System complexity
Answer: C
7. Which of the following PRIMARILY determines access privileges for user accounts?
Available Choices (select all choices that are correct)
A. Users' desire for ease of use
B. Authorization security policy
C. Common practice
D. Technical capability
Answer: B
8. What is the name of the missing layer in the Open Systems Interconnection (OSI) model
shown below?
 3 / 6
A. Control
B. Protocol
C. Transport
D. User
Answer: C
9. Which is a PRIMARY reason why network security is important in IACS environments?
Available Choices (select all choices that are correct)
A. PLCs are inherently unreliable.
B. PLCs are programmed using ladder logic.
C. PLCs use serial or Ethernet communications methods.
D. PLCs under cyber attack can have costly and dangerous impacts.
Answer: D
 4 / 6
10. Which analysis method is MOST frequently used as an input to a security risk assessment?
Available Choices (select all choices that are correct)
A. Failure Mode and Effects Analysis
B. Job Safety Analysis (JSA)
C. Process Hazard Analysis (PHA)
D. System Safety Analysis (SSA)
Answer: C
11. Which steps are part of implementing countermeasures?
Available Choices (select all choices that are correct)
A. Establish the risk tolerance and select common countermeasures.
B. Establish the risk tolerance and update the business continuity plan.
C. Select common countermeasures and update the business continuity plan.
D. Select common countermeasures and collaborate with stakeholders.
Answer: A
12. Which of the following is a trend that has caused a significant percentage of security
vulnerabilities? Available Choices (select all choices that are correct)
A. IACS developing into a network of air-gapped systems
B. IACS evolving into a number of closed proprietary systems
C. IACS using equipment designed for measurement and control
D. IACS becoming integrated with business and enterprise systems
Answer: D
13. How many security levels are in the ISASecure certification program?
Available Choices (select all choices that are correct)
A. 2
B. 3
C. 4
D. 5
Answer: D
14. What is OPC?
Available Choices (select all choices that are correct)
A. An open standard protocol for real-time field bus communication between automation
 5 / 6
technology devices
B. An open standard protocol for the communication of real-time data between devices from
different manufacturers
C. An open standard serial communications protocol widely used in industrial manufacturing
environments
D. A vendor-specific proprietary protocol for the communication of real-time plant data between
control devices
Answer: B
 
More Hot Exams are available.
350-401 ENCOR Exam Dumps
350-801 CLCOR Exam Dumps
200-301 CCNA Exam Dumps
Powered by TCPDF (www.tcpdf.org)
 6 / 6
https://www.certqueen.com/promotion.asp
https://www.certqueen.com/350-401.html
https://www.certqueen.com/350-801.html
https://www.certqueen.com/200-301.html
http://www.tcpdf.org