What type of controls are crucial within the Identify Function for inventory classification?
What type of controls are crucial within the Identify Function for inventory classification?A . Physical security controlsB . Data security controlsC . Classification and access controlsD . Network access controlsView AnswerAnswer: C
One of the five core functions in the NIST Cybersecurity Framework is ___, which focuses on minimizing the impact of cybersecurity events.
One of the five core functions in the NIST Cybersecurity Framework is ___, which focuses on minimizing the impact of cybersecurity events.A . RecoverB . DetectC . ProtectD . RespondView AnswerAnswer: D
Failing to schedule preventive service for the backup generator is a failure in which function?
Your data center uses a diesel generator as backup for two different power grids provided by your regional power company. During a period of unprecedented heat, you experience brown-outs on both grids simultaneously. The diesel generator starts up but only runs for two minutes before it also shuts down, leaving...
What is a recommended usage of the Detect function?
What is a recommended usage of the Detect function?A . Implement following the Protect FunctionB . Remain confidential to IT managementC . Communicate to appropriate levelsD . Eliminate risks among systemsView AnswerAnswer: C
In the NIST Cybersecurity Framework, the "Tiers" component is used to assess which of the following?
In the NIST Cybersecurity Framework, the "Tiers" component is used to assess which of the following?A . Cybersecurity incident responseB . The organization’s risk management maturityC . Network encryption standardsD . The organization’s compliance with regulationsView AnswerAnswer: B
What database is used to record and manage assets?
What database is used to record and manage assets?A . Configuration Management DatabaseB . Asset Inventory Management DatabaseC . High Availability Mirrored DatabaseD . Patch Management Inventory DatabaseView AnswerAnswer: A
What entity offers a framework that is ideally suited to handle an organization's operational challenges?
What entity offers a framework that is ideally suited to handle an organization's operational challenges?A . COBITB . COSOC . NISTD . ISOView AnswerAnswer: D
After a cybersecurity incident, which Respond Function activity focuses on assessing what went well and what could be improved?
After a cybersecurity incident, which Respond Function activity focuses on assessing what went well and what could be improved?A . Threat intelligence gatheringB . Root cause analysisC . After-action reviewD . Continuous monitoringView AnswerAnswer: C
The primary goal of the COBIT 2019 governance system is to ensure that ___ aligns with the overall business strategy.
The primary goal of the COBIT 2019 governance system is to ensure that ___ aligns with the overall business strategy.A . Cybersecurity risksB . IT operationsC . Network uptimeD . External compliance standardsView AnswerAnswer: A
When conducting a risk assessment as part of the NIST Cybersecurity Framework, which of the following elements is critical for identifying risks?
When conducting a risk assessment as part of the NIST Cybersecurity Framework, which of the following elements is critical for identifying risks?A . Industry benchmarksB . Asset inventoryC . Organizational policiesD . Network topologyView AnswerAnswer: B