The CSF recommends that the Communication Plan for an IRP include audience, method of communication, frequency, and what other element?

The CSF recommends that the Communication Plan for an IRP include audience, method of communication, frequency, and what other element?A . Incident categoryB . Message criteriaC . Incident severityD . Templates to useView AnswerAnswer: B

May 19, 2025 No Comments READ MORE +

Rank order the relative severity of impact to an organization of each plan, where “1” signifies the most impact and “4” signifies the least impact.

Rank order the relative severity of impact to an organization of each plan, where “1” signifies the most impact and “4” signifies the least impact. View AnswerAnswer:

May 16, 2025 No Comments READ MORE +

What determines the technical controls used to restrict access to USB devices and help prevent their use within a company?

What determines the technical controls used to restrict access to USB devices and help prevent their use within a company?A . Block use of the USB devices for all employeesB . Written security policy prohibiting the use of the USB devicesC . Acceptable use policy in the employee HR on-boarding...

May 15, 2025 No Comments READ MORE +

What activity is supported by the Protect function in the NIST Cybersecurity Framework Core?

What activity is supported by the Protect function in the NIST Cybersecurity Framework Core?A . Take action regarding a detected cybersecurity eventB . Manage cybersecurity risk to systems, assets, and dataC . Ensure delivery of critical infrastructure servicesD . Ensure resilience and restore services impacted by a cybersecurity eventView AnswerAnswer:...

May 14, 2025 No Comments READ MORE +

Within the Protect Function, ___________ involves limiting access to only those individuals who need it for their work.

Within the Protect Function, ___________ involves limiting access to only those individuals who need it for their work.A . Awareness TrainingB . Threat DetectionC . Access ControlD . Disaster RecoveryView AnswerAnswer: C

May 13, 2025 No Comments READ MORE +

The NIST Cybersecurity Framework relies on which of the following to guide organizations through effective cybersecurity risk management?

The NIST Cybersecurity Framework relies on which of the following to guide organizations through effective cybersecurity risk management?A . Tiers and ProfilesB . Incident Response PlansC . Vendor Management FrameworksD . Network Architecture PoliciesView AnswerAnswer: A

May 12, 2025 No Comments READ MORE +

In COBIT 2019, which design factor is essential for tailoring the implementation of the NIST Cybersecurity Framework to an organization's needs?

In COBIT 2019, which design factor is essential for tailoring the implementation of the NIST Cybersecurity Framework to an organization's needs?A . Organizational cultureB . Compliance regulationsC . External threatsD . Budget limitationsView AnswerAnswer: A

May 11, 2025 No Comments READ MORE +

Within the Protect Function, what is the purpose of implementing access control subcategory controls?

Within the Protect Function, what is the purpose of implementing access control subcategory controls?A . To enhance network traffic analysisB . To manage who can access specific assets and systemsC . To improve disaster recovery planningD . To facilitate endpoint protectionView AnswerAnswer: B

May 11, 2025 No Comments READ MORE +

What is the primary purpose of the COBIT 2019 governance framework in the context of cybersecurity?

What is the primary purpose of the COBIT 2019 governance framework in the context of cybersecurity?A . To improve firewall configurationsB . To ensure alignment between business goals and cybersecurity strategyC . To enforce external compliance regulationsD . To manage software development processesView AnswerAnswer: B

May 9, 2025 No Comments READ MORE +

What is a consideration when developing a Disaster Recovery Plan?

What is a consideration when developing a Disaster Recovery Plan?A . Define scenarios by type and scope of impactB . Develop termination strategiesC . Exchange essential information between stakeholdersD . Method to terminate incident responsesView AnswerAnswer: C

May 8, 2025 No Comments READ MORE +