JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.
Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)
Knowledge Check
Sign in to Google
to save your progress.
Learn more
* Indicates required question
1. What is the primary function of a firewall?
*
Block all internet traffic
Detect network intrusions
Filters network traffic
Authenticate users
2. Inter-network connection device that restricts data communication traffic between two connected networks is called a(n) _____________.
*
IDS
Firewall
Router
Anti-virus software
3. A robust and enterprise-wide awareness and training program is paramount
*
to protecting the IACS from different Threat Actors
to ensuring that all risks are mitigated
to ensuring that people understand their IT (and OT) security responsibilities, organizational policies, and how to properly use and protect the IT (OT) resources entrusted to them
to optimizing the IDS with the latest signatures
4. Implementation of policy involves
*
Creating appropriate and cost-effective policy
Communicating the policy to the organization
Training personnel in the organization
All of the above
5. Which port is used by MODBUS TCP?
*
Not defined
Depends on the operating system
TCP port 502
TCP port 520
6. What are the three main phases of the IACS Cybersecurity Lifecycle?
*
Assess, develop & mitigate, maintain
Design, implement, maintain
Assess, develop & implement, maintain
Design, mitigate, maintain
7. Which of the following is the correct risk equation?
*
Risk = Threat x Asset x Consequence
Risk = Threat x Vulnerability x Cost
Risk = Threat Agent x Threat x Vulnerability
Risk = Threat x Vulnerability x Consequence
8. The desired level of security for a system is known as?
*
Target security level
Achieved security level
Capability security level
Protection level
9. An unscheduled activity such as a security incident exposing unknown risk may trigger?
*
An immediate call to the police
A review of the CSMS
Hardening of all OT equipment
A recalculation of the CRRF
10. An Intrusion Detection System (IDS) is an example of what method of treating risk?
*
Detect
Deter
Defend
Defeat
11. Security service system that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of attempts to access system resources in an unauthorized manner is called a(n) _____________________.
*
IDS
Firewall
Router
Anti-virus software
12. What is the name of the firewall feature that analyzes protocols at the application layer to identify malicious or malformed packets?
*
Stateful inspection
Deep packet inspection
Packet filter
Layer 3 check
13. A three-tier network segmentation design that prevents direct communication between the enterprise network and the process control network by creating a buffer is also known as a(n) ________________.
*
Zones and conduits
Perimeter firewall
ICS firewall
DMZ
14. Which of the following are the main elements of the NIST CSF Framework?
*
Identify, protect, detect, respond, rephrase
Identify, protect, defend, detect, respond
Identify, protect, detect, remediate, recover
Identify, protect, detect, respond, recover
15. What are the main types of intrusion detection systems?
*
Perimeter Intrusion Detection & Network Intrusion Detection
Host Intrusion Detection & Network Intrusion Detection
Host Intrusion Detection & Intrusion Prevention Systems
Intrusion Prevention & Network Intrusion Detection
16. What is the desired outcome of the Initiate a CSMS program activity?
*
Conceptual diagrams that show how an AD forest can be attacked
Obtain leadership commitment, support, and funding
Identify software agents used by threat agents to propagate attacks
Conduct periodic IACS conformance audits
17. Which of the following is NOT a network device hardening best practice?
*
Install latest firmware updates
Shut down unused physical interfaces
Enable logging, collect logs (e.g. Syslog) and review regularly
Use Telnet for remote management
18. Which of the following is an example of dual-factor authentication?
*
Username and password
Digital certificate and smart card
Fingerprint and retinal signature
Fingerprint and smart card
19. A network that uses a public telecommunication infrastructure such as the Internet to provide remote networks or computers with secure access to another network is known as a ______________.
*
VLAN
VSAT
VPN
VNC
20. If a virus shuts down an industrial network by overloading the Ethernet switches which basic information security property is affected?
*
Integrity
Confidentiality
Availability
Reliability
Submit
Clear form
This form was created inside of International Society of Automation.
Report Abuse
Forms