Which document is designed to limit damage, reduce recovery time, and reduce costs where possible to the organization?
Which document is designed to limit damage, reduce recovery time, and reduce costs where possible to the organization?A . Business Impact AnalysisB . Business Continuity PlanC . Risk Assessment StrategyD . Incident Response PlanView AnswerAnswer: B
What categories are specifically contained within the Identify function?
What categories are specifically contained within the Identify function?A . Asset Management Governance Risk AssessmentB . Communications Supply Chain Management Business EnvironmentC . Business Environment Asset Management Anomalies and EventsD . Supply Chain Risk Data Security Response PlanningView AnswerAnswer: A
The ___ function of the NIST Cybersecurity Framework ensures timely identification of cybersecurity events.
The ___ function of the NIST Cybersecurity Framework ensures timely identification of cybersecurity events.A . RespondB . IdentifyC . DetectD . RecoverView AnswerAnswer: C
The ___________ component of the Detect Function is responsible for identifying unusual patterns or activities that may indicate a threat.
The ___________ component of the Detect Function is responsible for identifying unusual patterns or activities that may indicate a threat.A . Incident ResponseB . Anomalies and EventsC . Threat AssessmentD . Disaster RecoveryView AnswerAnswer: B
When should event analysis be performed?
When should event analysis be performed?A . Only when requested by an auditorB . Routinely for all events collected on a mission critical systemC . Only at the discretion of an authorized security analystD . After an event is triggered by the detection systemView AnswerAnswer: B
What are the five categories that make up the Response function?
What are the five categories that make up the Response function?A . Response Planning, Data Security, Communications, Analysis, and MitigationB . Response Planning, Communications, Analysis, Mitigation, and ImprovementsC . Mitigation, Improvements, Maintenance, Response Planning, and GovernanceD . Awareness and Training, Improvements, Communications, Analysis, and GovernanceView AnswerAnswer: B
Which function of the NIST Cybersecurity Framework should be prioritized first in building a cybersecurity strategy?
Which function of the NIST Cybersecurity Framework should be prioritized first in building a cybersecurity strategy?A . IdentifyB . ProtectC . DetectD . RecoverView AnswerAnswer: A
What document would you develop?
You have been tasked with documenting mission critical procedures of an organization that need to be sustained through a significant disruption. What document would you develop?A . Business Continuity PlanB . Business Impact AssessmentC . Risk Analysis ReportD . Regression Test PlanView AnswerAnswer: A
What are the main components of the NIST Cybersecurity Framework?
What are the main components of the NIST Cybersecurity Framework?A . Core, Categories, and TiersB . Functions, Profiles, and TiersC . Categories, Tiers, and ProfilesD . Core, Tiers, and ProfilesView AnswerAnswer: D
Which NIST Cybersecurity Framework function should be executed before any others?
Which NIST Cybersecurity Framework function should be executed before any others?A . RespondB . ProtectC . RecoverD . IdentifyView AnswerAnswer: D