Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)
©Copyright International Society of Automation (ISA) 2025. All rights reserved.
Artificial Intelligence Notice: ISA prohibits the entry of ISA standards and related ISA intellectual property (“ISA IP”) into any form of Artificial Intelligence (AI) tools, such as ChatGPT. Additionally, creating derivatives of ISA IP using AI is also prohibited without express written permission from ISA’s CEO. In the case of such use, ISA will suspend a licensee’s access to ISA IP, and further legal action will be considered. Please review ISA's Terms and Conditions for further information.
Sign in to Google to save your progress. Learn more
1. What is the primary function of a firewall?   
*
2. Inter-network connection device that restricts data communication traffic between two connected networks is called a(n) _____________.   
*
3. A robust and enterprise-wide awareness and training program is paramount to __________.  
*
  4. Implementation of policy involves __________.
*
  5. Which port is used by MODBUS TCP?  
*
6. What are the three main phases of the IACS Cybersecurity Lifecycle?   
*
7. Which of the following is the correct risk equation?  
*
8. The desired level of security for a system is known as the __________. 
*
9. An unscheduled activity, such as a security incident exposing unknown risk may trigger __________.  
*
10. An Intrusion Detection System (IDS) is an example of what method of treating risk?  
*
11. Security service system that monitors and analyzes system events for the purpose of finding and providing a real-time or near real-time warning of attempts to access system resources in an unauthorized manner is called a(n) __________.  
*
12. What is the name of the firewall feature that analyzes protocols at the application layer to identify malicious or malformed packets?   
*
13. A three-tier network segmentation design that prevents direct communication between the enterprise network and the process control network by creating a buffer is also known as a(n) __________.   
*
14. Which of the following are the main elements of the NIST CSF Framework?  
*
15. What are the main types of intrusion detection systems?   
*
16. What is the desired outcome of the "initiate a CSMS program" activity?   
*
17. Which of the following is NOT a network device hardening best practice?  
*
18. Which of the following is an example of dual-factor authentication?   
*
19. A network that uses a public telecommunication infrastructure, such as the Internet, to provide remote networks or computers with secure access to another network is known as a ______________. 
*
20. If a virus shuts down an industrial network by overloading the Ethernet switches, which basic information security property is affected?   
*
Submit
Clear form
This form was created inside of International Society of Automation.

Does this form look suspicious? Report