Fundamentals Specialist Dumps
Questions and Answers (Graded A)
Which of the following is an element of monitoring and improving a CSMS?
Available Choices (select all choices that are correct)
A. Increase in staff training and security awareness
B. Restricted access to the industrial control system to an as-needed basis
C. Significant changes in identified risk round in periodic reassessments
D. Review of system logs and other key data files - ANSWER-Answer: D
Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
A. Denial-of-service
B. Phishing
C. Escalation-of-privileges
D. Spoofing - ANSWER-Answer: B
What is a feature of an asymmetric key?
Available Choices (select all choices that are correct)
A. Uses a continuous stream
B. Uses different keys
C. Shares the same key OD.
D. Has lower network overhead - ANSWER-Answer: B
Which of the following is an example of separation of duties as a part of system
development and maintenance?
Available Choices (select all choices that are correct)
A. Changes are approved by one party and implemented by another.
B. Configuration settings are made by one party and self-reviewed using a checklist.
C. Developers write and then test their own code.
D. Design and implementation are performed by the same team. - ANSWER-Answer: A
What are the four main categories for documents in the ISA-62443 (IEC 62443) series?
Available Choices (select all choices that are correct)
A. General. Policies and Procedures. System, and Component
B. End-User, Integrator, Vendor, and Regulator
C. Assessment. Mitigation. Documentation, and Maintenance
D. People. Processes. Technology, and Training - ANSWER-Answer: A