DELL EMC D-CSF-SC-01 Dell NIST Cybersecurity Framework 2.0 Online Training
DELL EMC D-CSF-SC-01 Online Training
The questions for D-CSF-SC-01 were last updated at Feb 20,2025.
- Exam Code: D-CSF-SC-01
- Exam Name: Dell NIST Cybersecurity Framework 2.0
- Certification Provider: DELL EMC
- Latest update: Feb 20,2025
You have been tasked with documenting mission critical procedures of an organization that need to be sustained through a significant disruption.
What document would you develop?
- A . Business Continuity Plan
- B . Business Impact Assessment
- C . Risk Analysis Report
- D . Regression Test Plan
Match each Respond Function component with its primary purpose.
Component
Containment
Communications Plan
Incident Analysis
After-Action Review
Purpose
A) Limiting the spread of the incident
B) Guidelines for internal and external updates
C) Identifying the root cause of the incident
D) Evaluating response effectiveness
- A . Containment – A
Communications Plan – B
Incident Analysis – C
After-Action Review – D - B . Containment – A
Communications Plan – C
Incident Analysis – B
After-Action Review – D - C . Containment – A
Communications Plan – D
Incident Analysis – C
After-Action Review – B - D . Containment – C
Communications Plan – B
Incident Analysis – A
After-Action Review – D
When conducting a risk assessment as part of the NIST Cybersecurity Framework, which of the following elements is critical for identifying risks?
- A . Industry benchmarks
- B . Asset inventory
- C . Organizational policies
- D . Network topology
Which of the following is NOT one of the five core functions of the NIST Cybersecurity Framework?
- A . Protect
- B . Detect
- C . Validate
- D . Identify
What activity is supported by the Protect function in the NIST Cybersecurity Framework Core?
- A . Take action regarding a detected cybersecurity event
- B . Manage cybersecurity risk to systems, assets, and data
- C . Ensure delivery of critical infrastructure services
- D . Ensure resilience and restore services impacted by a cybersecurity event
Which of the following is essential for ensuring "timely recovery to normal operations" as defined in the Recover Function?
- A . Continuous monitoring
- B . Regular training sessions
- C . A Business Continuity Plan (BCP)
- D . Security access controls
What determines the technical controls used to restrict access to USB devices and help prevent their use within a company?
- A . Block use of the USB devices for all employees
- B . Written security policy prohibiting the use of the USB devices
- C . Acceptable use policy in the employee HR on-boarding training
- D . Detect use of the USB devices and report users
Which NIST Cybersecurity Framework tier describes an organization that adapts its cybersecurity practices based on evolving threats?
- A . Tier 1: Partial
- B . Tier 2: Risk-Informed
- C . Tier 3: Repeatable
- D . Tier 4: Adaptive
Your organization was breached. You informed the CSIRT and they contained the breach and eradicated the threat.
What is the next step required to ensure that you have an effective CSRL and a more robust cybersecurity posture in the future?
- A . Determine change agent
- B . Update the BIA
- C . Conduct a gap analysis
- D . Update the BCP
The NIST Cybersecurity Framework is structured around which main elements? (Select two)
- A . Core
- B . Tiers
- C . Objectives
- D . Roadmaps