1. What is the third maturity level according to IEC 62443-2-4 ?ManagedImprovedDefinedEpic 2. Which of the following requirements is imported for a secure supply chain?That legacy support for EoL products is assuredThere is mandatory validation that the components used haven't had a single CVE in the last yearThat no open-source software was purchasedThat a pentest of each library was conducted prior to purchasing 3. Network segmentation should be implemented on which of the following criteria?Based on the same communication protocolsBased on the same case colorBased on the age of the componentesBased on the defined risk level for the component 4. A jump serverspans two dissimilar security zones and provides a controlled means of access between themallows a user to bypass authentication security measuresis a useful concept to think about, but not yet an viable technologya model for network segmentation that fits every industry 5. NAC stands forNetwork Audit ControlNetwork Authentication ControlNetwork Access ControlNetwork Authorization Control 6. Which of the following statements is not true about hardening?Hardening processes are very individually dependent on the systems or software to be hardenedExisting guides on hardening specific systems can help with the implementationBy implementing hardening measures the attack surface of a system is reducedBy implementing hardening measures the attack surface of a system is increased 7. Which of the following information should be included in log records?Timestamp, source, category/type, event id, event resultTimestamp, destination, category/type, event id, event resultTimestamp, source, category/type, session id, event resultTimestamp, destination, category/type, user id, user password 8. Fast recovery of systems and their availability, isan essential factor for minimizing the extent of damage and business lossthe most important part of the incident handling processonly possible with high-availability systemsnot necessary if you have redundant systems Time is Up!