Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)
Knowledge Check
Sign in to Google to save your progress. Learn more
1. What is the primary function of a firewall?   
*
2. Inter-network connection device that restricts data communication traffic between two connected networks is called a(n) _____________.   
*
3. A robust and enterprise-wide awareness and training program is paramount  
*
  4. Implementation of policy involves  
*
  5. Which port is used by MODBUS TCP?  
*
6. What are the three main phases of the IACS Cybersecurity Lifecycle?   
*
7. Which of the following is the correct risk equation?  
*
8. The desired level of security for a system is known as?  
*
9. An unscheduled activity such as a security incident exposing unknown risk may trigger?  
*
10. An Intrusion Detection System (IDS) is an example of what method of treating risk?  
*
11. Security service system that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of attempts to access system resources in an unauthorized manner is called a(n) _____________________.  
*
12. What is the name of the firewall feature that analyzes protocols at the application layer to identify malicious or malformed packets?   
*
13. A three-tier network segmentation design that prevents direct communication between the enterprise network and the process control network by creating a buffer is also known as a(n) ________________.   
*
14. Which of the following are the main elements of the NIST CSF Framework?  
*
15. What are the main types of intrusion detection systems?   
*
16. What is the desired outcome of the Initiate a CSMS program activity?   
*
17. Which of the following is NOT a network device hardening best practice?  
*
18. Which of the following is an example of dual-factor authentication?   
*
19. A network that uses a public telecommunication infrastructure such as the Internet to provide remote networks or computers with secure access to another network is known as a ______________.   
*
20. If a virus shuts down an industrial network by overloading the Ethernet switches which basic information security property is affected?   
*
Submit
Clear form
This form was created inside of International Society of Automation. Report Abuse