0% found this document useful (0 votes)
70 views3 pages

ISA IC34 Reported Questions Set2

The document contains a set of sample questions related to the IACS Cybersecurity Lifecycle, covering various phases and components of cybersecurity. Key topics include risk assessment, security levels, and the importance of monitoring and testing in cybersecurity. Each question is accompanied by the correct answer, highlighting essential concepts in the field.

Uploaded by

amit.ee005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views3 pages

ISA IC34 Reported Questions Set2

The document contains a set of sample questions related to the IACS Cybersecurity Lifecycle, covering various phases and components of cybersecurity. Key topics include risk assessment, security levels, and the importance of monitoring and testing in cybersecurity. Each question is accompanied by the correct answer, highlighting essential concepts in the field.

Uploaded by

amit.ee005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

ISA IC34 Reported Sample Questions (Set 2)

1. What is the first phase in the IACS Cybersecurity Lifecycle?

A. Develop & Implement

B. Maintain

C. Assess

D. Test

Answer: C

2. During which phase are countermeasures implemented to meet SL-T?

A. Maintain

B. Develop & Implement

C. Assess

D. Monitor

Answer: B

3. What is the output of a High-Level Cyber Risk Assessment?

A. Security Policies

B. Cybersecurity Requirements Specification

C. Patch Report

D. Zone Diagrams

Answer: B

4. Which component is used to monitor traffic for suspicious behavior?

A. Firewall

B. Router

C. IDS

D. Switch
Answer: C

5. Which activity involves reducing the attack surface of a system?

A. Threat Modeling

B. System Hardening

C. Logging

D. Network Mirroring

Answer: B

6. Which document includes SUC description and zone/conduit drawings?

A. Incident Response Plan

B. CFAT Report

C. Cybersecurity Requirements Specification

D. Work Instruction

Answer: C

7. Security Level 1 (SL1) is designed to protect against:

A. Nation-state threats

B. Advanced Persistent Threats

C. Casual or coincidental threats

D. Malware campaigns

Answer: C

8. Which of the following best defines a Security Zone?

A. A set of IP addresses

B. A logical grouping of assets with the same security requirements

C. A firewall rule

D. A type of VPN tunnel

Answer: B
9. Which testing phase verifies cybersecurity requirements are implemented correctly?

A. Factory Acceptance Testing (FAT)

B. Penetration Testing

C. Cybersecurity Acceptance Testing (CSAT)

D. Unit Testing

Answer: C

10. What is the formula used to calculate Cybersecurity Risk?

A. Risk = Asset + Threat + Vulnerability

B. Risk = Vulnerability / Asset Value

C. Risk = Threat × Vulnerability × Consequence

D. Risk = Threat + Patch Time + Downtime

Answer: C

You might also like