Which of the following attacks relies on a human weakness to succeed?
Available Choices (select all choices that are correct)
A. Denial-of-service
B. Phishing
C. Escalation-of-privileges
D. Spoofing
Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?
Available Choices (select all choices that are correct)
A. Aligned development process
B. Aligned needs of industrial users
C. Well-documented security policies and procedures
D. Defense-in-depth approach to designing
Which of the following is an industry sector-specific standard?
Available Choices (select all choices that are correct)
A. ISA-62443 (EC 62443)
B. NIST SP800-82
C. API 1164
D. D. ISO 27001
Which type of cryptographic algorithms requires more than one key?
Available Choices (select all choices that are correct)
A. Block ciphers
B. Stream ciphers
C. Symmetric (private) key
D. Asymmetric (public) key
At Layer 4 of the Open Systems Interconnection (OSI) model, what identifies the application that will handle a packet inside a host?
Available Choices (select all choices that are correct)
A. ATCP/UDP application ID
B. A TCP/UDP host ID
C. ATCP/UDP port number
D. ATCP/UDP registry number
What type of security level defines what a component or system is capable of meeting?
Available Choices (select all choices that are correct)
A. Capability security level
B. Achieved security level
C. Design security level
D. Target security level
What are the four main categories for documents in the ISA-62443 (IEC 62443) series?
Available Choices (select all choices that are correct)
A. General. Policies and Procedures. System, and Component
B. End-User, Integrator, Vendor, and Regulator
C. Assessment. Mitigation. Documentation, and Maintenance
D. People. Processes. Technology, and Training
Which is a role of the application layer?
Available Choices (select all choices that are correct)
A. Includes protocols specific to network applications such as email, file transfer, and reading data registers in a PLC
B. Includes user applications specific to network applications such as email, file transfer, and reading data registers in a PLC
C. Provides the mechanism for opening, closing, and managing a session between end- user application processes D. Delivers and formats information, possibly with encryption and security
Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?
Available Choices (select all choices that are correct)
A. Forwards packets, including routing through intermediate routers
B. Gives transparent transfer of data between end users
C. Provides the rules for framing, converting electrical signals to data
D. Handles the physics of getting a message from one device to another
Authorization (user accounts) must be granted based on which of the following?
Available Choices (select all choices that are correct)
A. Individual preferences
B. Common needs for large groups
C. Specific roles
D. System complexity