The __________ process ensures that businesses can continue essential operations with minimal interruption after a cybersecurity incident.
The __________ process ensures that businesses can continue essential operations with minimal interruption after a cybersecurity incident.A . Incident DetectionB . Business ContinuityC . Access ControlD . Incident ResponseView AnswerAnswer: B
Which of the following are benefits of implementing continuous monitoring within the Detect Function? (Select two)
Which of the following are benefits of implementing continuous monitoring within the Detect Function? (Select two)A . Early detection of security incidentsB . Improved access control managementC . Enhanced visibility of network activityD . Reduction in hardware costsView AnswerAnswer: AC
In the context of the Recover Function, which of the following are critical for achieving business resiliency? (Select two)
In the context of the Recover Function, which of the following are critical for achieving business resiliency? (Select two)A . Risk assessment toolsB . Disaster recovery testingC . Incident response proceduresD . Cloud-based backup solutionsView AnswerAnswer: BD
The NIST Cybersecurity Framework is structured around which main elements? (Select two)
The NIST Cybersecurity Framework is structured around which main elements? (Select two)A . CoreB . TiersC . ObjectivesD . RoadmapsView AnswerAnswer: AB
What is the next step required to ensure that you have an effective CSRL and a more robust cybersecurity posture in the future?
Your organization was breached. You informed the CSIRT and they contained the breach and eradicated the threat. What is the next step required to ensure that you have an effective CSRL and a more robust cybersecurity posture in the future?A . Determine change agentB . Update the BIAC . Conduct...
Which category addresses the detection of unauthorized code in software?
Which category addresses the detection of unauthorized code in software?A . PR.DSB . DE.DPC . PR.ATD . DE.CMView AnswerAnswer: D
What is the primary focus of the BIA?
What is the primary focus of the BIA?A . Prevents threats to the environmentB . Determines criticality of assets to the businessC . Identifies roles and responsibilities for asset recoveryD . Maintains controls for recoveryView AnswerAnswer: B
In COBIT 2019, the design of a cybersecurity framework requires ___ to ensure that organizational objectives align with cybersecurity outcomes.
In COBIT 2019, the design of a cybersecurity framework requires ___ to ensure that organizational objectives align with cybersecurity outcomes.A . Governance principlesB . Communication strategiesC . Management involvementD . Framework mappingView AnswerAnswer: A
In the NIST Cybersecurity Framework, which of the following components is key to ensuring continuity in critical functions after a cybersecurity event?
In the NIST Cybersecurity Framework, which of the following components is key to ensuring continuity in critical functions after a cybersecurity event?A . ProtectB . IdentifyC . RecoverD . DetectView AnswerAnswer: C
How does the COBIT 2019 Framework assist organizations in managing cybersecurity risks?
How does the COBIT 2019 Framework assist organizations in managing cybersecurity risks?A . By providing technical control implementation guidanceB . By defining roles and responsibilities for governance and risk managementC . By conducting vulnerability scansD . By developing encryption standardsView AnswerAnswer: B