Question 6 of 77


Which is the PRIMARY responsibility of the network layer of the Open Systems Interconnection (OSI) model?

    Correct Answer: A

    The primary responsibility of the network layer of the OSI model is to forward packets, including routing through intermediate routers. This layer is responsible for determining the best path to send data from the source to the destination across potentially multiple networks.

Question 7 of 77


Which steps are included in the ISA/IEC 62443 assess phase?

    Correct Answer: A

    In the ISA/IEC 62443 cybersecurity lifecycle, the assess phase involves understanding the system's current state and identifying its vulnerabilities. This phase includes performing detailed cyber risk assessments to understand potential risks and specifying cybersecurity requirements to ensure that the system meets necessary safety and security standards.

Question 8 of 77


What type of security level defines what a component or system is capable of meeting?

    Correct Answer: A

    The type of security level that defines what a component or system is capable of meeting is known as the 'Capability security level.' This term accurately reflects the system's potential and ability to meet specific security requirements.

Question 9 of 77


Which steps are part of implementing countermeasures?

    Correct Answer: A

    Implementing countermeasures involves establishing the risk tolerance to determine the acceptable level of risk, and selecting common countermeasures to mitigate the identified risks. These steps ensure that the chosen countermeasures are aligned with the organization's risk management strategy and are effective in managing potential threats.

Question 10 of 77


Authorization (user accounts) must be granted based on which of the following?

    Correct Answer: C

    Authorization (user accounts) must be granted based on specific roles. This is because role-based access control (RBAC) assigns permissions to users based on their roles within an organization, ensuring that they have the minimum access necessary to perform their job functions. This approach enhances security and simplifies management of user permissions.