Who must be included in a training and security awareness program?
Answer : C
Which communications system covers a large geographic area?
Answer : D
Which is the PRIMARY reason why Modbus over Ethernet is easy to manage in a firewall?
Answer : C
Which of the following is the BEST example of detection-in-depth best practices?
Answer : B
What are the four main categories for documents in the ISA-62443 (IEC 62443) series?
Answer : A
What are the three main components of the ISASecure Integrated Threat Analysis (ITA) Program?
Answer : A
Which of the following can be employed as a barrier device in a segmented network?
Answer : A
What is the purpose of ISO/IEC 15408 (Common Criteria)?
Answer : C
What does Layer 1 of the ISO/OSI protocol stack provide?
Answer : C
At Layer 4 of the Open Systems Interconnection (OSI) model, what identifies the application that will handle a packet inside a host?
Answer : C
Safety management staff are stakeholders of what security program development?
Answer : A
Which type of cryptographic algorithms requires more than one key?
Answer : D
Multiuser accounts and shared passwords inherently carry which of the following risks?
Answer : A
What is the name of the protocol that implements serial Modbus over Ethernet?
Answer : D
What are the two sublayers of Layer 2?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us