What is phase 1 of the IACS Cybersecurity Life Cycle? - verified answer(s)-✔✔Assess
What is phase 2 of the IACS Cybersecurity Life Cycle? - verified answer(s)-✔✔Develop &
Implement
What is phase 3 of the IACS Cybersecurity Life Cycle? - verified answer(s)-✔✔Maintain
When are countermeasures are implemented to meet the Target Security Level (SL-T)? -
verified answer(s)-✔✔During the Develop & Implement phase of ICS security implementation
What is the primary goal of the Maintain phase in ICS security implementation? - verified
answer(s)-✔✔To ensure the Achieved Security Level (SL-A) is equal to or better than the
Target Security Level (SL-T).*
What is step 1 of the IACS Cybersecurity Life Cycle (Assess Phase)? - verified answer(s)-
✔✔High-Level Cyber Risk Assessment
What is step 2 of the IACS Cybersecurity Life Cycle (Assess Phase)? - verified answer(s)-
✔✔Allocation of IACS Assets to Security Zones or Conduits
What is step 3 of the IACS Cybersecurity Life Cycle (Assess Phase)? - verified answer(s)-
✔✔Detail Cyber Risk Assessment
What is step 4 of the IACS Cybersecurity Life Cycle (Develop & Implement Phase)? - verified
answer(s)-✔✔Cybersecurity Requirements Specification
, What is step 5 of the IACS Cybersecurity Life Cycle (Develop & Implement Phase)? - verified
answer(s)-✔✔Design and engineering of Cybersecurity countermeasures
What is step 6 of the IACS Cybersecurity Life Cycle (Develop & Implement Phase)? - verified
answer(s)-✔✔Installation, commissioning and validation of Cybersecurity countermeasures
What is step 7 of the IACS Cybersecurity Life Cycle (Maintain)? - verified answer(s)-
✔✔Cybersecurity Maintenance, Monitoring and Management of Change
What is step 8 of the IACS Cybersecurity Life Cycle (Maintain)? - verified answer(s)-✔✔Cyber
Incident Response & Recovery
What are the continuous processes activities of the IACS Cybersecurity Life Cycle? - verified
answer(s)-✔✔Cybersecurity Management System: Policies, Procedures, Training &
Awareness, Periodic Cybersecurity Audits
A risk assessment should provide information about what? - verified answer(s)-✔✔An entire
system as well as each zone
What information should be provided from a risk assessment? - verified answer(s)-✔✔-Risk
profile
-Highest severity consequences
-Threats / vulnerabilities leading to the highest risks
-Target Security Levels
-Recommendations