Exam4Training

DELL EMC DES-9131 Specialist – Infrastructure Security Exam Online Training

Question #1

What are the four tiers of integration within the NIST Cybersecurity Framework?

  • A . Selective, Repeatable, Partial, and Adaptive
  • B . Partial, Risk Informed, Repeatable, and Adaptive
  • C . Corrective, Risk Informed, Repeatable. and Adaptive
  • D . Risk Informed, Selective, Repeatable, and Partial

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://www.nist.gov/cyberframework/online-learning/components-framework

Question #2

What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and recover from malicious computer incidents such as a denial-of-service attack?

  • A . Disaster Recovery Plan
  • B . Emergency Analysis Plan
  • C . Crisis Communication Plan
  • D . Incident Response Plan

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf

Question #3

What determines the technical controls used to restrict access to USB devices and help prevent their use within a company?

  • A . Block use of the USB devices for all employees
  • B . Written security policy prohibiting the use of the USB devices
  • C . Acceptable use policy in the employee HR on-boarding training
  • D . Detect use of the USB devices and report users

Reveal Solution Hide Solution

Correct Answer: A
Question #4

Concerning a risk management strategy, what should the executive level be responsible for communicating?

  • A . Risk mitigation
  • B . Risk profile
  • C . Risk tolerance
  • D . Asset risk

Reveal Solution Hide Solution

Correct Answer: B
Question #5

What process is used to identify an organization’s physical, digital, and human resource, as required in their Business Impact Analysis?

  • A . Risk Management Strategy
  • B . Risk Assessment
  • C . Risk Treatment
  • D . Asset Inventory

Reveal Solution Hide Solution

Correct Answer: D
Question #6

What supports an organization in making risk management decisions to address their security posture in real time?

  • A . Baseline reporting
  • B . Continuous monitoring
  • C . User access reviews
  • D . Video surveillance

Reveal Solution Hide Solution

Correct Answer: A
Question #7

When should event analysis be performed?

  • A . Only when requested by an auditor
  • B . Routinely for all events collected on a mission critical system
  • C . Only at the discretion of an authorized security analyst
  • D . After an event is triggered by the detection system

Reveal Solution Hide Solution

Correct Answer: B
Question #8

What type of system processes information, the loss of which would have a debilitating impact to an organization?

  • A . Mission critical
  • B . Security critical
  • C . Business critical
  • D . Safety critical

Reveal Solution Hide Solution

Correct Answer: A
Question #9

Which mechanism within the NIST Cybersecurity Framework describes a method to capture the current state and define the target state for understanding gaps, exposure, and prioritize changes to mitigate risk?

  • A . Functions
  • B . Profiles
  • C . Tiers
  • D . Categories

Reveal Solution Hide Solution

Correct Answer: C
Question #10

The CSF recommends that the Communication Plan for an IRP include audience, method of communication, frequency, and what other element?

  • A . Incident category
  • B . Message criteria
  • C . Incident severity
  • D . Templates to use

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://www.utc.edu/information-technology/pdfs/it-comm-plan-master-2017.pdf (p.4)

Question #11

What is the main goal of a gap analysis in the Identify function?

  • A . Determine security controls to improve security measures
  • B . Determine actions required to get from the current profile state to the target profile state
  • C . Identify gaps between Cybersecurity Framework and Cyber Resilient Lifecycle pertaining to that function
  • D . Identify business process gaps to improve business efficiency

Reveal Solution Hide Solution

Correct Answer: B
Question #12

DRAG DROP

Rank order the relative severity of impact to an organization of each plan, where “1” signifies the most impact and “4” signifies the least impact.

Reveal Solution Hide Solution

Correct Answer:


Question #13

What does a security benchmark help define?

  • A . Whether or not the organization should implement ISCM
  • B . The Baseline, or “as is” state
  • C . Which step of the DRP to execute first
  • D . What parts of the Baseline are appropriate

Reveal Solution Hide Solution

Correct Answer: D
Question #14

In which function is the SDLC implemented?

  • A . Respond
  • B . Protect
  • C . Detect
  • D . Recover

Reveal Solution Hide Solution

Correct Answer: A
Question #15

Which category addresses the detection of unauthorized code in software?

  • A . PR.DS
  • B . DE.DP
  • C . PR.AT
  • D . DE.CM

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://vufind.carli.illinois.edu/vf-rou/Record/rou_346654/TOC

Question #16

What database is used to record and manage assets?

  • A . Configuration Management Database
  • B . Asset Inventory Management Database
  • C . High Availability Mirrored Database
  • D . Patch Management Inventory Database

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://en.wikipedia.org/wiki/Configuration_management_database

Question #17

The CSIRT team is following the existing recovery plans on non-production systems in a PRE-BREACH scenario.

This action is being executed in which function?

  • A . Protect
  • B . Recover
  • C . Identify
  • D . Respond

Reveal Solution Hide Solution

Correct Answer: A
Question #18

What is a consideration when performing data collection in Information Security Continuous Monitoring?

  • A . Data collection efficiency is increased through automation.
  • B . The more data collected, the better chances to catch an anomaly.
  • C . Collection is used only for compliance requirements.
  • D . Data is best captured as it traverses the network.

Reveal Solution Hide Solution

Correct Answer: A
Question #19

An organization has a policy to respond “ASAP” to security incidents. The security team is having a difficult time prioritizing events because they are responding to all of them, in order of receipt.

Which part of the IRP does the team need to implement or update?

  • A . Scheduling of incident responses
  • B . ‘Post mortem’ documentation
  • C . Classification of incidents
  • D . Containment of incidents

Reveal Solution Hide Solution

Correct Answer: C
Question #20

Your firewall blocked several machines on your network from connecting to a malicious IP address. After reviewing the logs, the CSIRT discovers all Microsoft Windows machines on the network have been affected based on a newly published CVE.

Based on the IRP, what should be done immediately?

  • A . Update the asset inventory
  • B . Contain the breach
  • C . Eradicate the breach
  • D . Revise the IRP

Reveal Solution Hide Solution

Correct Answer: A

Question #21

Which document provides an implementation plan to recover business functions and processes during and after an event?

  • A . Business Continuity Plan
  • B . Disaster Recovery Plan
  • C . Risk Assessment Strategy
  • D . Business Impact Analysis

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://www.bmc.com/blogs/disaster-recovery-planning/

Question #22

Which NIST Cybersecurity Framework function should be executed before any others?

  • A . Respond
  • B . Protect
  • C . Recover
  • D . Identify

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://www.nist.gov/cyberframework/online-learning/five-functions

Question #23

What is part of the Pre-Recovery phase?

  • A . Backup validation
  • B . Validate functionality
  • C . Restore assets
  • D . Monitor assets

Reveal Solution Hide Solution

Correct Answer: B
Question #24

Refer to the exhibit.

What type of item appears in the second column of the table?

  • A . Subcategory
  • B . Informative Reference
  • C . Function
  • D . Tier

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version