In which function is the SDLC implemented?
In which function is the SDLC implemented?A . RespondB . ProtectC . DetectD . RecoverView AnswerAnswer: B
Match each Recover Function component with its primary activity.
Match each Recover Function component with its primary activity. Component Disaster Recovery Business Continuity Data Restoration Impact Analysis Primary Activity A) Implementing backup solutions B) Ensuring minimum disruption to operations C) Recovering data post-incident D) Assessing the effect on business and financesA . Disaster Recovery - A Business Continuity -...
Which of the following is essential for ensuring "timely recovery to normal operations" as defined in the Recover Function?
Which of the following is essential for ensuring "timely recovery to normal operations" as defined in the Recover Function?A . Continuous monitoringB . Regular training sessionsC . A Business Continuity Plan (BCP)D . Security access controlsView AnswerAnswer: C
When implementing the NIST Cybersecurity Framework, what is the first step in the implementation process?
When implementing the NIST Cybersecurity Framework, what is the first step in the implementation process?A . Conduct a risk assessmentB . Define the current cybersecurity profileC . Identify gaps in security policiesD . Create a communication planView AnswerAnswer: B
What activity informs situational awareness of the security status of an organization's systems?
What activity informs situational awareness of the security status of an organization's systems?A . IDPB . RMFC . ISCMD . DPIView AnswerAnswer: C
What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and recover from malicious computer incidents such as unauthorized changes to system hardware, software, or data?
What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and recover from malicious computer incidents such as unauthorized changes to system hardware, software, or data?A . Emergency Analysis PlanB . Crisis Communication PlanC . Disaster Recovery PlanD . Incident Response PlanView AnswerAnswer: D
Which actions should you take to stop data leakage and comply with requirements of the company security policy?
The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT. Service disruption is not a concern because this server is used only to store files and does...
Which protective technologies are typically associated with the Protect Function? (Select two)
Which protective technologies are typically associated with the Protect Function? (Select two)A . Data encryptionB . Business impact analysisC . Access managementD . Threat intelligence analysisView AnswerAnswer: AC
When evaluating a cybersecurity framework, COBIT 2019 emphasizes ___ as a key design factor for tailoring the framework to the organization.
When evaluating a cybersecurity framework, COBIT 2019 emphasizes ___ as a key design factor for tailoring the framework to the organization.A . Compliance obligationsB . Organizational risk appetiteC . Current technology infrastructureD . Employee cybersecurity trainingView AnswerAnswer: B
This activity aligns with which part of the Protect Function?
A company is conducting awareness training for all employees to recognize phishing attacks. This activity aligns with which part of the Protect Function?A . Access ControlB . Protective TechnologyC . Awareness and TrainingD . Data SecurityView AnswerAnswer: C