FUNDAMENTALS SPECIALIST DUMPS
QUESTIONS
Which service does an Intrusion Detection System (IDS) provide?
Available Choices (select all choices that are correct)
A. It is the lock on the door for networks and computer systems.
B. It is effective against all vulnerabilities in networks and computer systems.
C. It blocks malicious activity in networks and computer systems.
D. It detects attempts to break into or misuse a computer system. - ANSWERS-
Answer: D
Which steps are included in the ISA/IEC 62443 assess phase?
Available Choices (select all choices that are correct)
A. Cybersecurity requirements specification and detailed cyber risk assessment
B. Cybersecurity requirements specification and allocation of IACS assets to zones
and conduits
C. Detailed cyber risk assessment and cybersecurity maintenance, monitoring,
and management of change
D. Allocation of IACS assets to zones and conduits, and detailed cyber risk
assessment - ANSWERS-Answer: B
, Which of the following ISA-99 (IEC 62443) Reference Model levels is named
correctly?
Available Choices (select all choices that are correct)
A. Level 1: Supervisory Control
B. Level 2: Quality Control
C. Level 3: Operations Management
D. Level 4: Process - ANSWERS-Answer: C
Which of the following is an element of monitoring and improving a CSMS?
Available Choices (select all choices that are correct)
A. Increase in staff training and security awareness
B. Restricted access to the industrial control system to an as-needed basis
C. Significant changes in identified risk round in periodic reassessments
D. Review of system logs and other key data files - ANSWERS-Answer: D
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
A. Denial-of-service
B. Phishing
C. Escalation-of-privileges
D. Spoofing - ANSWERS-Answer: B