Assessing the Cybersecurity of New or Existing IACS Systems (IC33)
Knowledge Check
Sign in to Google to save your progress. Learn more
1. Which of the following are considered an IACS asset?  
*
2. Which of the following is the “expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular consequence”?   
*
3. Which of the following is a “flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's integrity or security policy”?  
*
4. What are the three main phases of the IACS Cybersecurity Lifecycle?   
*
5. Which is the correct formula for cyber risk?  
*
6. What type of vulnerability assessment technique involves attempting to exploit a vulnerability?  
*
7. Which of the following is a benefit of performing an IACS cyber risk assessment?   
*
8. What is a threat source?  
*
9. Which of the following is the term for the undesirable result of an incident?  
*
10. Which of the following are types of vulnerability assessments?   
*
11. “Countermeasures” in cyber security are measures taken to:  
*
12. One-way safety is different from security in industrial plants is that:  
*
13. Which option are correct Foundational Requirements (FR) of the ISA/IEC-62443-3-3?  
*
14. The standard ISA 62443-3-2 belongs in which tier/group of the ISA 99 committee work products?   
*
15. The desired level of security for a system is known as?   
*
16. What are the main type of intrusion detection systems?  
*
17. What type of assessment uses tools to discover devices and vulnerabilities of IACS?  
*
18. Which of the following is the correct formula for Cyber Risk Reduction Factor (CRRF)?   
*
19. What type of assessment may include reviewing documents, system walk-thru, traffic analysis, or ARP tables?   
*
20. Which is the Security Level of protecting against intentional violation using sophisticated means with moderate resources, IACS specific skills and moderate motivation?  
*
Submit
Clear form
This form was created inside of International Society of Automation. Report Abuse