Fundamentals Specialist Dumps
Questions and Answers
Which of the following is an element of monitoring and improving a CSMS?
Available Choices (select all choices that are correct)
A. Increase in staff training and security awareness
B. Restricted access to the industrial control system to an as-needed basis
C. Significant changes in identified risk round in periodic reassessments
D. Review of system logs and other key data files - ANSWER-Answer: D
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
A. Denial-of-service
B. Phishing
C. Escalation-of-privileges
D. Spoofing - ANSWER-Answer: B
What is a feature of an asymmetric key?
Available Choices (select all choices that are correct)
A. Uses a continuous stream
B. Uses different keys
C. Shares the same key OD.
D. Has lower network overhead - ANSWER-Answer: B
Which organization manages the ISA Secure conformance certification program?
Available Choices (select all choices that are correct)
A. American Society for Industrial Security
B. Automation Federation
C. National Institute of Standards and Technology
D. Security Compliance Institute - ANSWER-Answer: D
Which is a PRIMARY reason why network security is important in IACS environments?
Available Choices (select all choices that are correct)
A. PLCs are inherently unreliable.
B. PLCs are programmed using ladder logic.
C. PLCs use serial or Ethernet communications methods.
D. PLCs under cyber attack can have costly and dangerous impacts. - ANSWER-
Answer: D