The ___ function of the NIST Cybersecurity Framework ensures timely identification of cybersecurity events.
The ___ function of the NIST Cybersecurity Framework ensures timely identification of cybersecurity events.A . RespondB . IdentifyC . DetectD . RecoverView AnswerAnswer: C
The ___________ component of the Detect Function is responsible for identifying unusual patterns or activities that may indicate a threat.
The ___________ component of the Detect Function is responsible for identifying unusual patterns or activities that may indicate a threat.A . Incident ResponseB . Anomalies and EventsC . Threat AssessmentD . Disaster RecoveryView AnswerAnswer: B
When should event analysis be performed?
When should event analysis be performed?A . Only when requested by an auditorB . Routinely for all events collected on a mission critical systemC . Only at the discretion of an authorized security analystD . After an event is triggered by the detection systemView AnswerAnswer: B
What are the five categories that make up the Response function?
What are the five categories that make up the Response function?A . Response Planning, Data Security, Communications, Analysis, and MitigationB . Response Planning, Communications, Analysis, Mitigation, and ImprovementsC . Mitigation, Improvements, Maintenance, Response Planning, and GovernanceD . Awareness and Training, Improvements, Communications, Analysis, and GovernanceView AnswerAnswer: B
Which function of the NIST Cybersecurity Framework should be prioritized first in building a cybersecurity strategy?
Which function of the NIST Cybersecurity Framework should be prioritized first in building a cybersecurity strategy?A . IdentifyB . ProtectC . DetectD . RecoverView AnswerAnswer: A
What document would you develop?
You have been tasked with documenting mission critical procedures of an organization that need to be sustained through a significant disruption. What document would you develop?A . Business Continuity PlanB . Business Impact AssessmentC . Risk Analysis ReportD . Regression Test PlanView AnswerAnswer: A
What are the main components of the NIST Cybersecurity Framework?
What are the main components of the NIST Cybersecurity Framework?A . Core, Categories, and TiersB . Functions, Profiles, and TiersC . Categories, Tiers, and ProfilesD . Core, Tiers, and ProfilesView AnswerAnswer: D
Which NIST Cybersecurity Framework function should be executed before any others?
Which NIST Cybersecurity Framework function should be executed before any others?A . RespondB . ProtectC . RecoverD . IdentifyView AnswerAnswer: D
What does the Identify Function facilitate in the context of Disaster Recovery and Incident Response planning?
What does the Identify Function facilitate in the context of Disaster Recovery and Incident Response planning?A . The identification of stakeholdersB . The development of communication protocolsC . Continuous asset inventory and classificationD . Implementation of security controlsView AnswerAnswer: C
What is the main goal of a gap analysis in the Identify function?
What is the main goal of a gap analysis in the Identify function?A . Determine security controls to improve security measuresB . Determine actions required to get from the current profile state to the target profile stateC . Identify gaps between Cybersecurity Framework and Cyber Resilient Lifecycle pertaining to that...