COMPLETE EXAM QUESTIONS WITH
CORRECT SOLUTIONS||ALREADY
GRADED 100% GUARANTEED PASS!!!
What is phase 1 of the IACS Cybersecurity Life Cycle? - ANSWER ✓ Assess
What is phase 2 of the IACS Cybersecurity Life Cycle? - ANSWER ✓ Develop &
Implement
What is phase 3 of the IACS Cybersecurity Life Cycle? - ANSWER ✓ Maintain
phase
What is step 1 of the IACS Cybersecurity Life Cycle (Assess Phase)? - ANSWER
✓ High-Level Cyber Risk Assessment
What is step 2 of the IACS Cybersecurity Life Cycle (Assess Phase)? - ANSWER
✓ Allocation of IACS Assets to Security Zones or Conduits
What is step 3 of the IACS Cybersecurity Life Cycle (Assess Phase)? - ANSWER
✓ Detail Cyber Risk Assessment
What is step 4 of the IACS Cybersecurity Life Cycle (Develop & Implement
Phase)? - ANSWER ✓ Cybersecurity Requirements Specification
What is step 5 of the IACS Cybersecurity Life Cycle (Develop & Implement
Phase)? - ANSWER ✓ Design and engineering of Cybersecurity countermeasures
What is step 6 of the IACS Cybersecurity Life Cycle (Develop & Implement
Phase)? - ANSWER ✓ Installation, commissioning and validation of Cybersecurity
countermeasures
What is step 7 of the IACS Cybersecurity Life Cycle (Maintain)? - ANSWER ✓
Cybersecurity Maintenance, Monitoring and Management of Change
,What is step 8 of the IACS Cybersecurity Life Cycle (Maintain)? - ANSWER ✓
Cyber Incident Response & Recovery
What is the purpose of assigning a Target Security Level (SL-T) during the Assess
phase of ICS security implementation? - ANSWER ✓ To determine the existing
vulnerabilities of the system.
What happens during the Develop & Implement phase of ICS security
implementation? - ANSWER ✓ Countermeasures are implemented to meet the
Target Security Level (SL-T).
What is the primary goal of the Maintain phase in ICS security implementation? -
ANSWER ✓ To ensure the Achieved Security Level (SL-A) is equal to or better
than the Target Security Level (SL-T).*
What are the continuous processes activities of the IACS Cybersecurity Life
Cycle? - ANSWER ✓ Cybersecurity Management System: Policies, Procedures,
Training & Awareness, Periodic Cybersecurity Audits
What ISA-95 levels are critical to safety, reliability, efficiency, and quality -
ANSWER ✓ Levels 3, 2, 1, 0 (The Control Domain)
At a minimum, Network Diagrams should include... - ANSWER ✓ Physical or
Logical connections
Individual network devices represented symbollically
Switch port assignments
VLANs
Hosts (optional)
Host Device - ANSWER ✓ Computing systems that host data or applications,
such as servers, workstations, and user devices.
Embedded Devices - ANSWER ✓ Computer systems with a dedicated function
within IACS, like PLCs, RTUs, or IEDs.
Network Device - ANSWER ✓ Components that facilitate data transmission
within an IACS, including switches, routers, and firewalls.
, Software Applications - ANSWER ✓ Software systems used to control, monitor,
or manage industrial processes, such as SCADA, HMI, MES, and ERP systems.
What is an Asset Inventory for IACS and SCADA Systems? - ANSWER ✓ A list
or database of all hardware (physical and virtual) and software within an IACS or
SCADA environment, compiled through documentation and site surveys.
Automated tools can be used for data gathering, but should be tested to avoid
system impact or security vulnerabilities.
Why must automated tools for compiling an asset inventory in IACS and SCADA
systems be carefully tested? - ANSWER ✓ To ensure they do not impact system
availability or integrity and do not introduce security vulnerabilities while
gathering asset information.
What should the hardware asset inventory in an IACS should include? - ANSWER
✓ Computers (e.g., servers, workstations), network equipment (e.g., switches,
routers, firewalls), and automation devices (e.g., PLCs, DCSs, VFDs, RTUs).
What types of devices should be included in the hardware asset inventory in an
IACS? - ANSWER ✓ All devices with an Ethernet connection and an IP address,
as well as devices with routable serial protocols like ControlNet, Profibus, Modbus
TCP, etc.
What attributes of devices should be documented in an asset inventory? -
ANSWER ✓ Device or System Name
Asset ID
Device Type
Function
Network interface(s)
Network address(es)
Manufacturer
Model
Serial Number
Operating system and version (if applicable)
Firmware versions (if applicable)
Responsible organization/individual
Physical Location
Logging Features (if applicable)