It is not a function of the NIST CSF Core Framework:

It is not a function of the NIST CSF Core Framework:A . Analyze (AN). B. Detect (DE). C. Identify (ID). D. None of the aboveView AnswerAnswer: A

January 30, 2023 No Comments READ MORE +

The activity «create a current CSF profile» indicates the following:

The activity «create a current CSF profile» indicates the following:A . This assessment could be guided by the organization’s overall risk management process or previous risk assessment activities. B. The organization develops a current profile indicating the category and subcategory results of the core Framework that are currently being achieved....

January 28, 2023 No Comments READ MORE +

Cyberspace assets maintain a category that is Personal Assets, which include:

Cyberspace assets maintain a category that is Personal Assets, which include:A . Intellectual property. B. Laptop of the entity. C. Virtual currency. D. None of the above.View AnswerAnswer: C

January 26, 2023 No Comments READ MORE +

It is not a NIST CSF objective:

It is not a NIST CSF objective:A . Establish a different language for managing Cybersecurity risks. B. Assist critical infrastructure managers and operators to identify, inventory and manage IT risks. C. None of the above. D. Establish criteria for the definition of metrics to control implementation performance.View AnswerAnswer: A

January 25, 2023 No Comments READ MORE +

The Identify function allows:

The Identify function allows:A . To develop organizational understanding to manage Cybersecurity risk to systems, assets, data and capabilities. B. None of the above. C. To develop and implement appropriate safeguards to ensure the provision of critical infrastructure services. D. To develop and implement appropriate activities to maintain resilience plans.View...

January 22, 2023 No Comments READ MORE +

The statement «The Framework provides a common language for communicating requirements among interdependent stakeholders responsible for the delivery of essential critical infrastructure services,» is:

The statement «The Framework provides a common language for communicating requirements among interdependent stakeholders responsible for the delivery of essential critical infrastructure services,» is:A . Depends on the parties concerned. B. True. C. None of the above. D. False.View AnswerAnswer: B

January 22, 2023 No Comments READ MORE +

The INFORMED RISK Implementation Level must comply with the following in the risk management process:

The INFORMED RISK Implementation Level must comply with the following in the risk management process:A . The risk management practices of the organization are formally approved and expressed as policies. B. Risk management practices are approved by management but cannot be established as organization-wide policies. C. None of the above....

January 21, 2023 No Comments READ MORE +

The purpose and scope of ISO/IEC 27032 is:

The purpose and scope of ISO/IEC 27032 is:A . To apply as a reference framework for information security in Latin American member countries. B. To develop and implement appropriate activities to maintain Cyber resilience plans. C. None of the above. D. To provide guidance to improve the state of Cybersecurity,...

January 21, 2023 No Comments READ MORE +

The subcategories are:

The subcategories are:A . None of the above. B. Cybersecurity Controls. C. Extension of Cybersecurity functions. D. Specific sections of rules.View AnswerAnswer: B

January 19, 2023 No Comments READ MORE +

Among the interested parties within cyberspace, we have suppliers, which include:

Among the interested parties within cyberspace, we have suppliers, which include:A . None of the above. B. Server providers. C. Application providers. D. Remote access providers.View AnswerAnswer: C

January 18, 2023 No Comments READ MORE +