Which document is designed to limit damage, reduce recovery time, and reduce costs where possible to the organization?

Which document is designed to limit damage, reduce recovery time, and reduce costs where possible to the organization?A . Business Impact AnalysisB . Business Continuity PlanC . Risk Assessment StrategyD . Incident Response PlanView AnswerAnswer: B

April 9, 2025 No Comments READ MORE +

What categories are specifically contained within the Identify function?

What categories are specifically contained within the Identify function?A . Asset Management Governance Risk AssessmentB . Communications Supply Chain Management Business EnvironmentC . Business Environment Asset Management Anomalies and EventsD . Supply Chain Risk Data Security Response PlanningView AnswerAnswer: A

April 9, 2025 No Comments READ MORE +

The ___ function of the NIST Cybersecurity Framework ensures timely identification of cybersecurity events.

The ___ function of the NIST Cybersecurity Framework ensures timely identification of cybersecurity events.A . RespondB . IdentifyC . DetectD . RecoverView AnswerAnswer: C

April 8, 2025 No Comments READ MORE +

The ___________ component of the Detect Function is responsible for identifying unusual patterns or activities that may indicate a threat.

The ___________ component of the Detect Function is responsible for identifying unusual patterns or activities that may indicate a threat.A . Incident ResponseB . Anomalies and EventsC . Threat AssessmentD . Disaster RecoveryView AnswerAnswer: B

April 8, 2025 No Comments READ MORE +

When should event analysis be performed?

When should event analysis be performed?A . Only when requested by an auditorB . Routinely for all events collected on a mission critical systemC . Only at the discretion of an authorized security analystD . After an event is triggered by the detection systemView AnswerAnswer: B

April 6, 2025 No Comments READ MORE +

What are the five categories that make up the Response function?

What are the five categories that make up the Response function?A . Response Planning, Data Security, Communications, Analysis, and MitigationB . Response Planning, Communications, Analysis, Mitigation, and ImprovementsC . Mitigation, Improvements, Maintenance, Response Planning, and GovernanceD . Awareness and Training, Improvements, Communications, Analysis, and GovernanceView AnswerAnswer: B

April 5, 2025 No Comments READ MORE +

Which function of the NIST Cybersecurity Framework should be prioritized first in building a cybersecurity strategy?

Which function of the NIST Cybersecurity Framework should be prioritized first in building a cybersecurity strategy?A . IdentifyB . ProtectC . DetectD . RecoverView AnswerAnswer: A

April 4, 2025 No Comments READ MORE +

What document would you develop?

You have been tasked with documenting mission critical procedures of an organization that need to be sustained through a significant disruption. What document would you develop?A . Business Continuity PlanB . Business Impact AssessmentC . Risk Analysis ReportD . Regression Test PlanView AnswerAnswer: A

April 3, 2025 No Comments READ MORE +

What are the main components of the NIST Cybersecurity Framework?

What are the main components of the NIST Cybersecurity Framework?A . Core, Categories, and TiersB . Functions, Profiles, and TiersC . Categories, Tiers, and ProfilesD . Core, Tiers, and ProfilesView AnswerAnswer: D

April 3, 2025 No Comments READ MORE +

Which NIST Cybersecurity Framework function should be executed before any others?

Which NIST Cybersecurity Framework function should be executed before any others?A . RespondB . ProtectC . RecoverD . IdentifyView AnswerAnswer: D

April 3, 2025 No Comments READ MORE +