DELL EMC DES-9131 Specialist – Infrastructure Security Exam Online Training
DELL EMC DES-9131 Online Training
The questions for DES-9131 were last updated at Nov 19,2024.
- Exam Code: DES-9131
- Exam Name: Specialist - Infrastructure Security Exam
- Certification Provider: DELL EMC
- Latest update: Nov 19,2024
What are the four tiers of integration within the NIST Cybersecurity Framework?
- A . Selective, Repeatable, Partial, and Adaptive
- B . Partial, Risk Informed, Repeatable, and Adaptive
- C . Corrective, Risk Informed, Repeatable. and Adaptive
- D . Risk Informed, Selective, Repeatable, and Partial
What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and recover from malicious computer incidents such as a denial-of-service attack?
- A . Disaster Recovery Plan
- B . Emergency Analysis Plan
- C . Crisis Communication Plan
- D . Incident Response Plan
What determines the technical controls used to restrict access to USB devices and help prevent their use within a company?
- A . Block use of the USB devices for all employees
- B . Written security policy prohibiting the use of the USB devices
- C . Acceptable use policy in the employee HR on-boarding training
- D . Detect use of the USB devices and report users
Concerning a risk management strategy, what should the executive level be responsible for communicating?
- A . Risk mitigation
- B . Risk profile
- C . Risk tolerance
- D . Asset risk
What process is used to identify an organization’s physical, digital, and human resource, as required in their Business Impact Analysis?
- A . Risk Management Strategy
- B . Risk Assessment
- C . Risk Treatment
- D . Asset Inventory
What supports an organization in making risk management decisions to address their security posture in real time?
- A . Baseline reporting
- B . Continuous monitoring
- C . User access reviews
- D . Video surveillance
When should event analysis be performed?
- A . Only when requested by an auditor
- B . Routinely for all events collected on a mission critical system
- C . Only at the discretion of an authorized security analyst
- D . After an event is triggered by the detection system
What type of system processes information, the loss of which would have a debilitating impact to an organization?
- A . Mission critical
- B . Security critical
- C . Business critical
- D . Safety critical
Which mechanism within the NIST Cybersecurity Framework describes a method to capture the current state and define the target state for understanding gaps, exposure, and prioritize changes to mitigate risk?
- A . Functions
- B . Profiles
- C . Tiers
- D . Categories
The CSF recommends that the Communication Plan for an IRP include audience, method of communication, frequency, and what other element?
- A . Incident category
- B . Message criteria
- C . Incident severity
- D . Templates to use