What does the Identify Function facilitate in the context of Disaster Recovery and Incident Response planning?

What does the Identify Function facilitate in the context of Disaster Recovery and Incident Response planning?A . The identification of stakeholdersB . The development of communication protocolsC . Continuous asset inventory and classificationD . Implementation of security controlsView AnswerAnswer: C

April 2, 2025 No Comments READ MORE +

What is the main goal of a gap analysis in the Identify function?

What is the main goal of a gap analysis in the Identify function?A . Determine security controls to improve security measuresB . Determine actions required to get from the current profile state to the target profile stateC . Identify gaps between Cybersecurity Framework and Cyber Resilient Lifecycle pertaining to that...

April 2, 2025 No Comments READ MORE +

What type of controls are crucial within the Identify Function for inventory classification?

What type of controls are crucial within the Identify Function for inventory classification?A . Physical security controlsB . Data security controlsC . Classification and access controlsD . Network access controlsView AnswerAnswer: C

April 2, 2025 No Comments READ MORE +

One of the five core functions in the NIST Cybersecurity Framework is ___, which focuses on minimizing the impact of cybersecurity events.

One of the five core functions in the NIST Cybersecurity Framework is ___, which focuses on minimizing the impact of cybersecurity events.A . RecoverB . DetectC . ProtectD . RespondView AnswerAnswer: D

March 31, 2025 No Comments READ MORE +

Failing to schedule preventive service for the backup generator is a failure in which function?

Your data center uses a diesel generator as backup for two different power grids provided by your regional power company. During a period of unprecedented heat, you experience brown-outs on both grids simultaneously. The diesel generator starts up but only runs for two minutes before it also shuts down, leaving...

March 31, 2025 No Comments READ MORE +

What is a recommended usage of the Detect function?

What is a recommended usage of the Detect function?A . Implement following the Protect FunctionB . Remain confidential to IT managementC . Communicate to appropriate levelsD . Eliminate risks among systemsView AnswerAnswer: C

March 30, 2025 No Comments READ MORE +

In the NIST Cybersecurity Framework, the "Tiers" component is used to assess which of the following?

In the NIST Cybersecurity Framework, the "Tiers" component is used to assess which of the following?A . Cybersecurity incident responseB . The organization’s risk management maturityC . Network encryption standardsD . The organization’s compliance with regulationsView AnswerAnswer: B

March 28, 2025 No Comments READ MORE +

What database is used to record and manage assets?

What database is used to record and manage assets?A . Configuration Management DatabaseB . Asset Inventory Management DatabaseC . High Availability Mirrored DatabaseD . Patch Management Inventory DatabaseView AnswerAnswer: A

March 28, 2025 No Comments READ MORE +

What entity offers a framework that is ideally suited to handle an organization's operational challenges?

What entity offers a framework that is ideally suited to handle an organization's operational challenges?A . COBITB . COSOC . NISTD . ISOView AnswerAnswer: D

March 28, 2025 No Comments READ MORE +

After a cybersecurity incident, which Respond Function activity focuses on assessing what went well and what could be improved?

After a cybersecurity incident, which Respond Function activity focuses on assessing what went well and what could be improved?A . Threat intelligence gatheringB . Root cause analysisC . After-action reviewD . Continuous monitoringView AnswerAnswer: C

March 27, 2025 No Comments READ MORE +