In which function is the SDLC implemented?

In which function is the SDLC implemented?A . RespondB . ProtectC . DetectD . RecoverView AnswerAnswer: B

May 4, 2025 No Comments READ MORE +

Match each Recover Function component with its primary activity.

Match each Recover Function component with its primary activity. Component Disaster Recovery Business Continuity Data Restoration Impact Analysis Primary Activity A) Implementing backup solutions B) Ensuring minimum disruption to operations C) Recovering data post-incident D) Assessing the effect on business and financesA . Disaster Recovery - A Business Continuity -...

May 2, 2025 No Comments READ MORE +

Which of the following is essential for ensuring "timely recovery to normal operations" as defined in the Recover Function?

Which of the following is essential for ensuring "timely recovery to normal operations" as defined in the Recover Function?A . Continuous monitoringB . Regular training sessionsC . A Business Continuity Plan (BCP)D . Security access controlsView AnswerAnswer: C

May 1, 2025 No Comments READ MORE +

When implementing the NIST Cybersecurity Framework, what is the first step in the implementation process?

When implementing the NIST Cybersecurity Framework, what is the first step in the implementation process?A . Conduct a risk assessmentB . Define the current cybersecurity profileC . Identify gaps in security policiesD . Create a communication planView AnswerAnswer: B

April 30, 2025 No Comments READ MORE +

What activity informs situational awareness of the security status of an organization's systems?

What activity informs situational awareness of the security status of an organization's systems?A . IDPB . RMFC . ISCMD . DPIView AnswerAnswer: C

April 29, 2025 No Comments READ MORE +

What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and recover from malicious computer incidents such as unauthorized changes to system hardware, software, or data?

What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and recover from malicious computer incidents such as unauthorized changes to system hardware, software, or data?A . Emergency Analysis PlanB . Crisis Communication PlanC . Disaster Recovery PlanD . Incident Response PlanView AnswerAnswer: D

April 29, 2025 No Comments READ MORE +

Which actions should you take to stop data leakage and comply with requirements of the company security policy?

The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT. Service disruption is not a concern because this server is used only to store files and does...

April 27, 2025 No Comments READ MORE +

Which protective technologies are typically associated with the Protect Function? (Select two)

Which protective technologies are typically associated with the Protect Function? (Select two)A . Data encryptionB . Business impact analysisC . Access managementD . Threat intelligence analysisView AnswerAnswer: AC

April 27, 2025 No Comments READ MORE +

When evaluating a cybersecurity framework, COBIT 2019 emphasizes ___ as a key design factor for tailoring the framework to the organization.

When evaluating a cybersecurity framework, COBIT 2019 emphasizes ___ as a key design factor for tailoring the framework to the organization.A . Compliance obligationsB . Organizational risk appetiteC . Current technology infrastructureD . Employee cybersecurity trainingView AnswerAnswer: B

April 25, 2025 No Comments READ MORE +

This activity aligns with which part of the Protect Function?

A company is conducting awareness training for all employees to recognize phishing attacks. This activity aligns with which part of the Protect Function?A . Access ControlB . Protective TechnologyC . Awareness and TrainingD . Data SecurityView AnswerAnswer: C

April 23, 2025 No Comments READ MORE +