DELL EMC D-CSF-SC-23 NIST Cybersecurity Framework 2023 Exam Online Training
DELL EMC D-CSF-SC-23 Online Training
The questions for D-CSF-SC-23 were last updated at Nov 22,2024.
- Exam Code: D-CSF-SC-23
- Exam Name: NIST Cybersecurity Framework 2023 Exam
- Certification Provider: DELL EMC
- Latest update: Nov 22,2024
What is the purpose of the Asset Management category?
- A . Prevent unauthorized access, damage, and interference to business premises and information
- B . Support asset management strategy and information infrastructure security policies
- C . Avoid breaches of any criminal or civil law, statutory, regulatory, or contractual obligations
- D . Inventory physical devices and systems, software platform and applications, and communication flows
What is a consideration when performing data collection in Information Security Continuous Monitoring?
- A . Data collection efficiency is increased through automation.
- B . The more data collected, the better chances to catch an anomaly.
- C . Collection is used only for compliance requirements.
- D . Data is best captured as it traverses the network.
What database is used to record and manage assets?
- A . Configuration Management Database
- B . Asset Inventory Management Database
- C . High Availability Mirrored Database
- D . Patch Management Inventory Database
What is used to ensure an organization understands the security risk to operations, assets, and individuals?
- A . Risk Management Strategy
- B . Risk Assessment
- C . Operational Assessment
- D . Risk Profile
What is the purpose of separation of duties?
- A . Internal control to prevent fraud
- B . Enhance exposure to functional areas
- C . Encourage collaboration
- D . Mitigate collusion and prevent theft
A bank has been alerted to a breach of its reconciliation systems. The notification came from the cybercriminals claiming responsibility in an email to the CEO. The CEO has alerted the company CSIRT.
What does the Communication Plan for the IRP specifically guide against?
- A . Transfer of chain of custody
- B . Accelerated turn over
- C . Rushed disclosure
- D . Initiating kill chain
An organization has a policy to respond “ASAP” to security incidents. The security team is having a difficult time prioritizing events because they are responding to all of them, in order of receipt.
Which part of the IRP does the team need to implement or update?
- A . Scheduling of incident responses
- B . ‘Post mortem’ documentation
- C . Classification of incidents
- D . Containment of incidents
What determines the technical controls used to restrict access to USB devices and help prevent their use within a company?
- A . Block use of the USB devices for all employees
- B . Written security policy prohibiting the use of the USB devices
- C . Acceptable use policy in the employee HR on-boarding training
- D . Detect use of the USB devices and report users
What helps an organization compare an "as-is, to-be" document and identify opportunities for improving cybersecurity posture useful for capturing organizational baselines of today and their desired state of tomorrow so that a gap analysis can be conducted?
- A . Framework
- B . Core
- C . Assessment
- D . Profile
The CSIRT team is following the existing recovery plans on non-production systems in a PRE-BREACH scenario. This action is being executed in which function?
- A . Protect
- B . Recover
- C . Identify
- D . Respond