What is the purpose of ISO/IEC 15408 (Common Criteria)?
Available Choices (select all choices that are correct)
A. To define a security management organization
B. To describe a process for risk management
C. To define a product development evaluation methodology
D. To describe what constitutes a secure product
Which is one of the PRIMARY goals of providing a framework addressing secure product development life-cycle requirements?
Available Choices (select all choices that are correct)
A. Aligned development process
B. Aligned needs of industrial users
C. Well-documented security policies and procedures
D. Defense-in-depth approach to designing
Which of the following is an activity that should trigger a review of the CSMS?
Available Choices (select all choices that are correct)
A. Budgeting
B. New technical controls
C. Organizational restructuring
D. Security incident exposing previously unknown risk.
Which type of cryptographic algorithms requires more than one key?
Available Choices (select all choices that are correct)
A. Block ciphers
B. Stream ciphers
C. Symmetric (private) key
D. Asymmetric (public) key
How many element qroups are in the "Addressinq Risk" CSMS cateqorv?
Available Choices (select all choices that are correct)
A. 2
B. 3
C. 4
D. 5
What does the abbreviation CSMS round in ISA 62443-2-1 represent?
Available Choices (select all choices that are correct)
A. Control System Management System
B. Control System Monitoring System
C. Cyber Security Management System
D. Cyber Security Monitoring System
Authorization (user accounts) must be granted based on which of the following?
Available Choices (select all choices that are correct)
A. Individual preferences
B. Common needs for large groups
C. Specific roles
D. System complexity
Which of the following is an example of separation of duties as a part of system development and maintenance?
Available Choices (select all choices that are correct)
A. Changes are approved by one party and implemented by another.
B. Configuration settings are made by one party and self-reviewed using a checklist.
C. Developers write and then test their own code.
D. Design and implementation are performed by the same team.
Electronic security, as defined in ANSI/ISA-99.00.01:2007. includes which of the following?
Available Choices (select all choices that are correct)
A. Security guidelines for the proper configuration of IACS computers and operating systems
B. Computers, networks, operating systems, applications, and other programmable configurable components of the system
C. Personnel, policies, and procedures related to the security of computers, networks. PLCs, and other programmable configurable components of the system
D. Security guidelines for the proper configuration of IACS PLCs and other programmable configurable components of the system
Which of the following is a trend that has caused a significant percentage of security vulnerabilities?
Available Choices (select all choices that are correct)
A. IACS developing into a network of air-gapped systems
B. IACS evolving into a number of closed proprietary systems
C. IACS using equipment designed for measurement and control
D. IACS becoming integrated with business and enterprise systems