What is an accurate statement concerning the Cyber Resilient Lifecycle (CRLC) and the Cybersecurity Framework (CSF)?
What is an accurate statement concerning the Cyber Resilient Lifecycle (CRLC) and the Cybersecurity Framework (CSF)?A . The CRLC is focused on business resiliency; the CSF is focused on providing a framework.B . The CRLC can be used to make the CSF actionable.C . The CRLC is focused on cybersecurity;...
Which of the following are key components of an Incident Response Plan? (Select two)
Which of the following are key components of an Incident Response Plan? (Select two)A . Identification and containment proceduresB . Inventory and classification of assetsC . Communication guidelinesD . Budget allocation for new technologyView AnswerAnswer: AC
Tiers in the NIST Cybersecurity Framework help organizations assess their level of ___.
Tiers in the NIST Cybersecurity Framework help organizations assess their level of ___.A . Technical maturityB . Cybersecurity governanceC . Risk managementD . Vendor complianceView AnswerAnswer: C
Which COBIT 2019 component aligns most closely with the "Respond" function of the NIST Cybersecurity Framework?
Which COBIT 2019 component aligns most closely with the "Respond" function of the NIST Cybersecurity Framework?A . Risk managementB . Incident responseC . Cybersecurity budgetingD . IT complianceView AnswerAnswer: B
COBIT 2019 complements the NIST Cybersecurity Framework by focusing on what aspect of cybersecurity risk management?
COBIT 2019 complements the NIST Cybersecurity Framework by focusing on what aspect of cybersecurity risk management?A . Monitoring technical network controlsB . Governance and oversightC . Ensuring incident responseD . Increasing encryption strengthView AnswerAnswer: B
Which activity is crucial in the Respond Function to ensure proper documentation of the steps taken during a cybersecurity incident?
Which activity is crucial in the Respond Function to ensure proper documentation of the steps taken during a cybersecurity incident?A . Continuous monitoringB . Incident analysisC . Communications planningD . Incident documentationView AnswerAnswer: D
Which document is designed to limit damage, reduce recovery time, and reduce costs where possible to the organization?
Which document is designed to limit damage, reduce recovery time, and reduce costs where possible to the organization?A . Business Impact AnalysisB . Business Continuity PlanC . Risk Assessment StrategyD . Incident Response PlanView AnswerAnswer: B
What categories are specifically contained within the Identify function?
What categories are specifically contained within the Identify function?A . Asset Management Governance Risk AssessmentB . Communications Supply Chain Management Business EnvironmentC . Business Environment Asset Management Anomalies and EventsD . Supply Chain Risk Data Security Response PlanningView AnswerAnswer: A
The ___ function of the NIST Cybersecurity Framework ensures timely identification of cybersecurity events.
The ___ function of the NIST Cybersecurity Framework ensures timely identification of cybersecurity events.A . RespondB . IdentifyC . DetectD . RecoverView AnswerAnswer: C
The ___________ component of the Detect Function is responsible for identifying unusual patterns or activities that may indicate a threat.
The ___________ component of the Detect Function is responsible for identifying unusual patterns or activities that may indicate a threat.A . Incident ResponseB . Anomalies and EventsC . Threat AssessmentD . Disaster RecoveryView AnswerAnswer: B