The __________ component of the Respond Function involves ensuring that all affected parties, both internal and external, receive timely updates during an incident.
The __________ component of the Respond Function involves ensuring that all affected parties, both internal and external, receive timely updates during an incident.A . Communications PlanB . Recovery StrategyC . Incident AnalysisD . Continuous MonitoringView AnswerAnswer: A
What is part of the Pre-Recovery phase?
What is part of the Pre-Recovery phase?A . Backup validationB . Validate functionalityC . Restore assetsD . Monitor assetsView AnswerAnswer: B
Which of the following best describes the purpose of the Detect Function within the NIST Cybersecurity Framework?
Which of the following best describes the purpose of the Detect Function within the NIST Cybersecurity Framework?A . To identify potential security incidentsB . To develop disaster recovery plansC . To create security awareness among employeesD . To restrict access to critical systemsView AnswerAnswer: A
What is the purpose of a baseline assessment?
What is the purpose of a baseline assessment?A . Enhance data integrityB . Determine costsC . Reduce deployment timeD . Determine riskView AnswerAnswer: D
What contains a predefined set of instructions or processes that describes the management policy, procedures, and written plan defining recovery of information systems?
What contains a predefined set of instructions or processes that describes the management policy, procedures, and written plan defining recovery of information systems?A . RASB . DRPC . BIAD . BCPView AnswerAnswer: D
Which part of the NIST Framework are they focusing on?
An organization is creating a customized version of the NIST Cybersecurity Framework to align with its unique risk profile and business requirements. They are currently mapping their organizational priorities and risk tolerance to the framework functions. Which part of the NIST Framework are they focusing on?A . CoreB . TiersC...
Match each Detect Function component with its primary purpose.
Match each Detect Function component with its primary purpose. Component Continuous Monitoring Anomalies and Events Detection Processes Threat Intelligence Purpose A) Real-time observation for suspicious activities B) Identifying unusual patterns C) Formalizing detection protocols D) Analyzing data to identify threatsA . Continuous Monitoring - A Anomalies and Events - B...
Match each Protect Function subcategory with its main focus.
Match each Protect Function subcategory with its main focus. Subcategory Data Security Awareness Training Protective Technology Baseline Configuration Focus A) Ensuring only authorized personnel have access B) Educating employees on cybersecurity practices C) Implementing tools to safeguard systems and networks D) Establishing a secure starting point for systemsA . Data...
Which NIST Cybersecurity Framework tier describes an organization that adapts its cybersecurity practices based on evolving threats?
Which NIST Cybersecurity Framework tier describes an organization that adapts its cybersecurity practices based on evolving threats?A . Tier 1: PartialB . Tier 2: Risk-InformedC . Tier 3: RepeatableD . Tier 4: AdaptiveView AnswerAnswer: D
What process is used to identify an organization’s physical, digital, and human resource, as required in their Business Impact Analysis?
What process is used to identify an organization’s physical, digital, and human resource, as required in their Business Impact Analysis?A . Risk Management StrategyB . Risk AssessmentC . Risk TreatmentD . Asset InventoryView AnswerAnswer: D