What type of controls are crucial within the Identify Function for inventory classification?

What type of controls are crucial within the Identify Function for inventory classification?A . Physical security controlsB . Data security controlsC . Classification and access controlsD . Network access controlsView AnswerAnswer: C

April 2, 2025 No Comments READ MORE +

One of the five core functions in the NIST Cybersecurity Framework is ___, which focuses on minimizing the impact of cybersecurity events.

One of the five core functions in the NIST Cybersecurity Framework is ___, which focuses on minimizing the impact of cybersecurity events.A . RecoverB . DetectC . ProtectD . RespondView AnswerAnswer: D

March 31, 2025 No Comments READ MORE +

Failing to schedule preventive service for the backup generator is a failure in which function?

Your data center uses a diesel generator as backup for two different power grids provided by your regional power company. During a period of unprecedented heat, you experience brown-outs on both grids simultaneously. The diesel generator starts up but only runs for two minutes before it also shuts down, leaving...

March 31, 2025 No Comments READ MORE +

What is a recommended usage of the Detect function?

What is a recommended usage of the Detect function?A . Implement following the Protect FunctionB . Remain confidential to IT managementC . Communicate to appropriate levelsD . Eliminate risks among systemsView AnswerAnswer: C

March 30, 2025 No Comments READ MORE +

In the NIST Cybersecurity Framework, the "Tiers" component is used to assess which of the following?

In the NIST Cybersecurity Framework, the "Tiers" component is used to assess which of the following?A . Cybersecurity incident responseB . The organization’s risk management maturityC . Network encryption standardsD . The organization’s compliance with regulationsView AnswerAnswer: B

March 28, 2025 No Comments READ MORE +

What database is used to record and manage assets?

What database is used to record and manage assets?A . Configuration Management DatabaseB . Asset Inventory Management DatabaseC . High Availability Mirrored DatabaseD . Patch Management Inventory DatabaseView AnswerAnswer: A

March 28, 2025 No Comments READ MORE +

What entity offers a framework that is ideally suited to handle an organization's operational challenges?

What entity offers a framework that is ideally suited to handle an organization's operational challenges?A . COBITB . COSOC . NISTD . ISOView AnswerAnswer: D

March 28, 2025 No Comments READ MORE +

After a cybersecurity incident, which Respond Function activity focuses on assessing what went well and what could be improved?

After a cybersecurity incident, which Respond Function activity focuses on assessing what went well and what could be improved?A . Threat intelligence gatheringB . Root cause analysisC . After-action reviewD . Continuous monitoringView AnswerAnswer: C

March 27, 2025 No Comments READ MORE +

The primary goal of the COBIT 2019 governance system is to ensure that ___ aligns with the overall business strategy.

The primary goal of the COBIT 2019 governance system is to ensure that ___ aligns with the overall business strategy.A . Cybersecurity risksB . IT operationsC . Network uptimeD . External compliance standardsView AnswerAnswer: A

March 25, 2025 No Comments READ MORE +

When conducting a risk assessment as part of the NIST Cybersecurity Framework, which of the following elements is critical for identifying risks?

When conducting a risk assessment as part of the NIST Cybersecurity Framework, which of the following elements is critical for identifying risks?A . Industry benchmarksB . Asset inventoryC . Organizational policiesD . Network topologyView AnswerAnswer: B

March 24, 2025 No Comments READ MORE +