IC32 Knowledge Check-PDF
IC32 Knowledge Check-PDF
2. Inter-network connection device that restricts data communication traffic between two
connected networks is called a(n) .
a. IDS
b. Firewall
c. Router
d. Anti-virus software
a. Not defined
b. Depends on the Operating System
c. TCP port 502
d. TCP port 520
6. What are the three main phases of the IACS Cybersecurity Lifecycle?
a. a n i m m e d i a t e c a l l to the police
b. a r eview of the CSMS
c. hardening of all OT equipment
d. a recalculation of the CRRF
10. An Intrusion Detection System (IDS) is an example of what method of treating risk?
a. Detect
b. Deter
c. Defend
d. Defeat
a. IDS
b. Firewall
c. Router
d. Anti-virus software
12. What is the name of the firewall feature that analyzes protocols at the application
layer to identify malicious or malformed packets?
a. Stateful inspection
b. Deep packet inspection
c. Packet filter
d. Layer 3 check
13. A three-tier network segmentation design that prevents direct communication between
the enterprise network and the process control network by creating a buffer is also
known as a(n) .
14. Which of the following are the main elements of the NIST CSF Framework?
17. Which of the following is NOT a network device hardening best practice?
a. Install latest firmware updates
b. Shut down unused physical interfaces
c. Enable logging, collect logs (e.g. Syslog) and review regularly
d. Use Telnet for remote management
19. A network that uses a public telecommunication infrastructure such as the Internet to
provide remote networks or computers with secure access to another network is known as
a .
a. VLAN
b. VSAT
c. VPN
d. VNC
20. If a virus shuts down an industrial network by overloading the Ethernet switches
which basic information security property is affected?
a. Integrity
b. Confidentiality
c. Availability
d. Reliability
2022, ISA
IC32 v5.0
IC32 - Post-Instructional Survey
1) Which three basic properties are the building blocks of cyber security?
2) What is the biggest security problem if business networks connect directly to industrial control
systems?
a) Too many business users requesting data will slow control system operation to a crawl,
endangering the security of processes.
b) Unauthorized business users, outsiders and malware can penetrate critical industrial control
systems and upset critical processes.
c) Production workers will change data in business systems given the opportunity
d) Cybersecurity insurance will increase in cost
a) Security policy, objectives and activities that reflect business rationale and objectives.
b) Strict rules that forbid interconnection of control system to business systems.
c) The latest in security technologies.
d) The latest in hardware technologies.
a) Safety considers the effects of malicious actions, not just the causes.
b) The field of safety encompasses the field of security.
c) Safety concerns itself with human error and the natural causes of accidents, while security
may involve malicious behavior.
d) Safety concerns itself with malicious behavior, while security may involve human error and the
natural causes of accidents.
a) IEC 61850
b) ISO 27001:2013
c) ISA 95
d) ISA 84
a) COBIT 5
b) ISO/IEC 15408:2009
c) ISA/IEC 62443
d) ISO 27001:2013
9) The standard ISA 62443-2-1 belongs in which tier/group of the ISA 99 committee work
products?
a) Component
b) System
c) General
d) Policies & Procedures
10) Which of the following is NOT generally considerered to be a requirement of industrial control
systems?
a) Real-time performance
b) High availability
c) Frequent updates
d) HSE considerations
a) Replay
b) Access Controls
c) Encryption
d) Intrusion Detection
13) A logical grouping of physical, informational, and application assets sharing common security
requirements is called a(n) __________________
a) Security model
b) Asset model
c) Conduit
d) Zone
a) Session
b) Network
c) Transport
d) Data
a) Layer 4
b) Layer 3
c) Send and forget
d) Layer 7
17) “Protection against intentional violation using sophisticated means with moderate resources,
IACS specific skills and moderate motivation” refers to ?
a) SL 5
b) SL 2
c) SL 4
d) SL 3
18) What is Microsoft’s normal scheduled release day for security patches?
a) Identify Threats
b) Identify Critical Assets and Consequences
c) Define Methodology for Identifying Risks
d) Analyze Threats
22) What is the desired outcome of the Initiate a CSMS program activity?
23) Which organization bridges the gap between 62443 standards and their implementation?
a) Fuzz testing
b) Network traffic load testing
c) Vulnerability scanning
d) All the above
25) What are the three main phases of the ISA/IEC 62443 Cybersecurity Lifecycle?