DELL EMC D-CSF-SC-23 NIST Cybersecurity Framework 2023 Exam Online Training
DELL EMC D-CSF-SC-23 Online Training
The questions for D-CSF-SC-23 were last updated at Nov 22,2024.
- Exam Code: D-CSF-SC-23
- Exam Name: NIST Cybersecurity Framework 2023 Exam
- Certification Provider: DELL EMC
- Latest update: Nov 22,2024
You have completed a review of your current security baseline policy. In order to minimize financial, legal, and reputational damage, the baseline configuration requires that infrastructure be categorized for the BIA.
Which categorizations are necessary for the BIA?
- A . Mission critical and business critical only
- B . Mission critical, safety critical, and business critical
- C . Security critical, safety critical, and business critical
- D . Mission critical and safety critical only
In accordance with PR.MA, an organization has just truncated all log files that are more than 12 months old. This has freed up 25 TB per logging server.
What must be updated once the transaction is verified?
- A . SDLC
- B . IRP
- C . Baseline
- D . ISCM
What activity informs situational awareness of the security status of an organization’s systems?
- A . IDP
- B . RMF
- C . ISCM
- D . DPI
What is the effect of changing the Baseline defined in the NIST Cybersecurity Framework?
- A . Negative impact on recovery
- B . Does not result in changes to the BIA
- C . Positive impact on detection
- D . Review of previously generated alerts
The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT. Service disruption is not a concern because this server is used only to store files and does not hold any critical workload.
Your company security policy required that all forensic information must be preserved.
Which actions should you take to stop data leakage and comply with requirements of the company security policy?
- A . Disconnect the file server from the network to stop data leakage and keep it powered on for further analysis.
- B . Shut down the server to stop the data leakage and power it up only for further forensic analysis.
- C . Restart the server to purge all malicious connections and keep it powered on for further analysis.
- D . Create a firewall rule to block all external connections for this file server and keep it powered on for further analysis.
Which category addresses the detection of unauthorized code in software?
- A . PR.DS
- B . DE.DP
- C . PR.AT
- D . DE.CM
Which phase in the SDLC is most concerned with maintaining proper authentication of users and processes to ensure an appropriate access control policy is defined?
- A . Implementation
- B . Operation / Maintenance
- C . Initiation
- D . Development / Acquisition
A company failed to detect a breach of their production system. The breach originated from a legacy system that was originally thought to be decommissioned. It turned out that system was still operating and occasionally connected to the production system for reporting purposes.
Which part of the process failed?
- A . DE.CM
- B . ID.BE
- C . ID.AM
- D . PR.DS
A company implemented an intrusion detection system. They notice the system generates a very large number of false alarms.
What steps should the company take to rectify this situation?
- A . Re-evaluate the Baseline and make necessary adjustments to the detection rules
- B . Replace the intrusion detection system with an intrusion protection system
- C . Define how to identify and disregard the false alarms
- D . Consider evaluating a system from another vendor
What are the five categories that make up the Response function?
- A . Response Planning, Data Security, Communications, Analysis, and Mitigation
- B . Response Planning, Communications, Analysis, Mitigation, and Improvements
- C . Mitigation, Improvements, Maintenance, Response Planning, and Governance
- D . Awareness and Training, Improvements, Communications, Analysis, and Governance