ISA IC34 Reported Sample Questions (Set 2)
1. What is the first phase in the IACS Cybersecurity Lifecycle?
A. Develop & Implement
B. Maintain
C. Assess
D. Test
Answer: C
2. During which phase are countermeasures implemented to meet SL-T?
A. Maintain
B. Develop & Implement
C. Assess
D. Monitor
Answer: B
3. What is the output of a High-Level Cyber Risk Assessment?
A. Security Policies
B. Cybersecurity Requirements Specification
C. Patch Report
D. Zone Diagrams
Answer: B
4. Which component is used to monitor traffic for suspicious behavior?
A. Firewall
B. Router
C. IDS
D. Switch
Answer: C
5. Which activity involves reducing the attack surface of a system?
A. Threat Modeling
B. System Hardening
C. Logging
D. Network Mirroring
Answer: B
6. Which document includes SUC description and zone/conduit drawings?
A. Incident Response Plan
B. CFAT Report
C. Cybersecurity Requirements Specification
D. Work Instruction
Answer: C
7. Security Level 1 (SL1) is designed to protect against:
A. Nation-state threats
B. Advanced Persistent Threats
C. Casual or coincidental threats
D. Malware campaigns
Answer: C
8. Which of the following best defines a Security Zone?
A. A set of IP addresses
B. A logical grouping of assets with the same security requirements
C. A firewall rule
D. A type of VPN tunnel
Answer: B
9. Which testing phase verifies cybersecurity requirements are implemented correctly?
A. Factory Acceptance Testing (FAT)
B. Penetration Testing
C. Cybersecurity Acceptance Testing (CSAT)
D. Unit Testing
Answer: C
10. What is the formula used to calculate Cybersecurity Risk?
A. Risk = Asset + Threat + Vulnerability
B. Risk = Vulnerability / Asset Value
C. Risk = Threat × Vulnerability × Consequence
D. Risk = Threat + Patch Time + Downtime
Answer: C