What is an accurate statement concerning the Cyber Resilient Lifecycle (CRLC) and the Cybersecurity Framework (CSF)?

What is an accurate statement concerning the Cyber Resilient Lifecycle (CRLC) and the Cybersecurity Framework (CSF)?A . The CRLC is focused on business resiliency; the CSF is focused on providing a framework.B . The CRLC can be used to make the CSF actionable.C . The CRLC is focused on cybersecurity;...

April 16, 2025 No Comments READ MORE +

Which of the following are key components of an Incident Response Plan? (Select two)

Which of the following are key components of an Incident Response Plan? (Select two)A . Identification and containment proceduresB . Inventory and classification of assetsC . Communication guidelinesD . Budget allocation for new technologyView AnswerAnswer: AC

April 15, 2025 No Comments READ MORE +

Tiers in the NIST Cybersecurity Framework help organizations assess their level of ___.

Tiers in the NIST Cybersecurity Framework help organizations assess their level of ___.A . Technical maturityB . Cybersecurity governanceC . Risk managementD . Vendor complianceView AnswerAnswer: C

April 12, 2025 No Comments READ MORE +

Which COBIT 2019 component aligns most closely with the "Respond" function of the NIST Cybersecurity Framework?

Which COBIT 2019 component aligns most closely with the "Respond" function of the NIST Cybersecurity Framework?A . Risk managementB . Incident responseC . Cybersecurity budgetingD . IT complianceView AnswerAnswer: B

April 11, 2025 No Comments READ MORE +

COBIT 2019 complements the NIST Cybersecurity Framework by focusing on what aspect of cybersecurity risk management?

COBIT 2019 complements the NIST Cybersecurity Framework by focusing on what aspect of cybersecurity risk management?A . Monitoring technical network controlsB . Governance and oversightC . Ensuring incident responseD . Increasing encryption strengthView AnswerAnswer: B

April 10, 2025 No Comments READ MORE +

Which activity is crucial in the Respond Function to ensure proper documentation of the steps taken during a cybersecurity incident?

Which activity is crucial in the Respond Function to ensure proper documentation of the steps taken during a cybersecurity incident?A . Continuous monitoringB . Incident analysisC . Communications planningD . Incident documentationView AnswerAnswer: D

April 10, 2025 No Comments READ MORE +

Which document is designed to limit damage, reduce recovery time, and reduce costs where possible to the organization?

Which document is designed to limit damage, reduce recovery time, and reduce costs where possible to the organization?A . Business Impact AnalysisB . Business Continuity PlanC . Risk Assessment StrategyD . Incident Response PlanView AnswerAnswer: B

April 9, 2025 No Comments READ MORE +

What categories are specifically contained within the Identify function?

What categories are specifically contained within the Identify function?A . Asset Management Governance Risk AssessmentB . Communications Supply Chain Management Business EnvironmentC . Business Environment Asset Management Anomalies and EventsD . Supply Chain Risk Data Security Response PlanningView AnswerAnswer: A

April 9, 2025 No Comments READ MORE +

The ___ function of the NIST Cybersecurity Framework ensures timely identification of cybersecurity events.

The ___ function of the NIST Cybersecurity Framework ensures timely identification of cybersecurity events.A . RespondB . IdentifyC . DetectD . RecoverView AnswerAnswer: C

April 8, 2025 No Comments READ MORE +

The ___________ component of the Detect Function is responsible for identifying unusual patterns or activities that may indicate a threat.

The ___________ component of the Detect Function is responsible for identifying unusual patterns or activities that may indicate a threat.A . Incident ResponseB . Anomalies and EventsC . Threat AssessmentD . Disaster RecoveryView AnswerAnswer: B

April 8, 2025 No Comments READ MORE +