Questions and Answers
What is the purpose of the 'Assess' phase in the IACS security lifecycle?
Conduct detailed risk assessment
Which level of the Purdue enterprise reference architecture is associated with MEM/MOMS systems?
Level 3
In the 'Implement and design' phase, what task involves the installation, commissioning, and validation of countermeasures?
Design and engineering of cybersecurity countermeasures
Which component is NOT part of the scope preparation for an assessment as mentioned in the text?
Signup and view all the answers
What are some of the continuous processes mentioned in terms of cybersecurity management system?
Signup and view all the answers
What type of devices should be included in the Asset Inventory Hardware?
Signup and view all the answers
Which tool is NOT listed under Software Asset Management (SAM) tools?
Signup and view all the answers
What does 'Cyber risk' in the context of cybersecurity consist of?
Signup and view all the answers
Which of the following is a tool used for Active vulnerability assessment?
Signup and view all the answers
What is the purpose of a Gap assessment in the context of IACS cybersecurity vulnerability assessment?
Signup and view all the answers