What does the Identify Function facilitate in the context of Disaster Recovery and Incident Response planning?
What does the Identify Function facilitate in the context of Disaster Recovery and Incident Response planning?A . The identification of stakeholdersB . The development of communication protocolsC . Continuous asset inventory and classificationD . Implementation of security controlsView AnswerAnswer: C
What is the main goal of a gap analysis in the Identify function?
What is the main goal of a gap analysis in the Identify function?A . Determine security controls to improve security measuresB . Determine actions required to get from the current profile state to the target profile stateC . Identify gaps between Cybersecurity Framework and Cyber Resilient Lifecycle pertaining to that...
What type of controls are crucial within the Identify Function for inventory classification?
What type of controls are crucial within the Identify Function for inventory classification?A . Physical security controlsB . Data security controlsC . Classification and access controlsD . Network access controlsView AnswerAnswer: C
One of the five core functions in the NIST Cybersecurity Framework is ___, which focuses on minimizing the impact of cybersecurity events.
One of the five core functions in the NIST Cybersecurity Framework is ___, which focuses on minimizing the impact of cybersecurity events.A . RecoverB . DetectC . ProtectD . RespondView AnswerAnswer: D
Failing to schedule preventive service for the backup generator is a failure in which function?
Your data center uses a diesel generator as backup for two different power grids provided by your regional power company. During a period of unprecedented heat, you experience brown-outs on both grids simultaneously. The diesel generator starts up but only runs for two minutes before it also shuts down, leaving...
What is a recommended usage of the Detect function?
What is a recommended usage of the Detect function?A . Implement following the Protect FunctionB . Remain confidential to IT managementC . Communicate to appropriate levelsD . Eliminate risks among systemsView AnswerAnswer: C
In the NIST Cybersecurity Framework, the "Tiers" component is used to assess which of the following?
In the NIST Cybersecurity Framework, the "Tiers" component is used to assess which of the following?A . Cybersecurity incident responseB . The organization’s risk management maturityC . Network encryption standardsD . The organization’s compliance with regulationsView AnswerAnswer: B
What database is used to record and manage assets?
What database is used to record and manage assets?A . Configuration Management DatabaseB . Asset Inventory Management DatabaseC . High Availability Mirrored DatabaseD . Patch Management Inventory DatabaseView AnswerAnswer: A
What entity offers a framework that is ideally suited to handle an organization's operational challenges?
What entity offers a framework that is ideally suited to handle an organization's operational challenges?A . COBITB . COSOC . NISTD . ISOView AnswerAnswer: D
After a cybersecurity incident, which Respond Function activity focuses on assessing what went well and what could be improved?
After a cybersecurity incident, which Respond Function activity focuses on assessing what went well and what could be improved?A . Threat intelligence gatheringB . Root cause analysisC . After-action reviewD . Continuous monitoringView AnswerAnswer: C