Final Evaluation 2150
March 14, 2023
To complete the final assessment, you will need to answer the following questionnaire in the form of multiple choice. Keep in mind that for each question, there is only one correct answer. Incorrect answers do not detract from the score. To graduate, you will need to have 70% of the correct answers. We will give you up to two opportunities to take the test.
We use the same assessment mechanism as ISA for the International certificate used in official ISA courses.
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 20
1. Question
Which of the following is a goal of cybersecurity acceptance testing?
CorrectIncorrect -
Question 2 of 20
2. Question
Is the validation of cybersecurity countermeasures an element of which phase?
CorrectIncorrect -
Question 3 of 20
3. Question
Which of the following best describes a continuous process component in the industrial cybersecurity lifecycle?
CorrectIncorrect -
Question 4 of 20
4. Question
Before you begin an assessment, you need to define the scope. Which of the following is a key component in defining the scope?
CorrectIncorrect -
Question 5 of 20
5. Question
At what stage of industrial cybersecurity does the identification of anomalies and intrusions in existing systems occur?
CorrectIncorrect -
Question 6 of 20
6. Question
Which of the following is the “loss expectation, expressed as the probability that a particular threat will exploit a particular vulnerability with a particular consequence”?
CorrectIncorrect -
Question 7 of 20
7. Question
What is a CSRS?
CorrectIncorrect -
Question 8 of 20
8. Question
What are the three main phases of the industrial cybersecurity lifecycle?
CorrectIncorrect -
Question 9 of 20
9. Question
Which of the following is a benefit of conducting an industrial cyber risk assessment?
CorrectIncorrect -
Question 10 of 20
10. Question
Which of the following is the term for the undesirable outcome of an incident?
CorrectIncorrect -
Question 11 of 20
11. Question
Is the desired level of security for a particular system known as?
CorrectIncorrect -
Question 12 of 20
12. Question
What differentiates a risk assessment from a vulnerability assessment?
CorrectIncorrect -
Question 13 of 20
13. Question
What are the typical variables in a 2D risk matrix?
CorrectIncorrect -
Question 14 of 20
14. Question
Indicate which of the following options corresponds to a passive threat.
CorrectIncorrect -
Question 15 of 20
15. Question
Which of the following options are Active Threats?
CorrectIncorrect -
Question 16 of 20
16. Question
To which isa99 Committee working group does the ISA/IEC-62443-2-1 standard belong?
CorrectIncorrect -
Question 17 of 20
17. Question
Which of the following formulas is correct?
CorrectIncorrect -
Question 18 of 20
18. Question
The activity or element of the ISA/IEC 62443 standard identified as “Business Rationality” is mandatory.
CorrectIncorrect -
Question 19 of 20
19. Question
Which of the following are considered assets for Industrial Cybersecurity?
CorrectIncorrect -
Question 20 of 20
20. Question
Which of the following options are all typical or most common vulnerabilities in industrial systems?
CorrectIncorrect