Fundamentals Specialist Dumps
Questions and Answers
Which of the following is an element of monitoring and improving a CSMS?
Available Choices (select all choices that are correct)
A. Increase in staff training and security awareness
B. Restricted access to the industrial control system to an as-needed basis
C. Significant changes in identified risk round in periodic reassessments
D. Review of system logs and other key data files - ANSWER-Answer: D
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
A. Denial-of-service
B. Phishing
C. Escalation-of-privileges
D. Spoofing - ANSWER-Answer: B
What is a feature of an asymmetric key?
Available Choices (select all choices that are correct)
A. Uses a continuous stream
B. Uses different keys
C. Shares the same key OD.
D. Has lower network overhead - ANSWER-Answer: B
Available Choices (select all choices that are correct)
A. PLCs are inherently unreliable.
B. PLCs are programmed using ladder logic.
C. PLCs use serial or Ethernet communications methods.
D. PLCs under cyber attack can have costly and dangerous impacts. - ANSWER-
Answer: D
Which service does an Intrusion Detection System (IDS) provide?
Available Choices (select all choices that are correct)
A. It is the lock on the door for networks and computer systems.
B. It is effective against all vulnerabilities in networks and computer systems.
C. It blocks malicious activity in networks and computer systems.
D. It detects attempts to break into or misuse a computer system. - ANSWER-Answer:
D