Concerning a risk management strategy, what should the executive level be responsible for communicating?

Concerning a risk management strategy, what should the executive level be responsible for communicating?A . Risk mitigationB . Risk profileC . Risk toleranceD . Asset riskView AnswerAnswer: C

November 21, 2023No CommentsREAD MORE +

Which actions should you take to stop data leakage and comply with requirements of the company security policy?

The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT. Service disruption is not a concern because this server is used only to store files and does...

November 21, 2023No CommentsREAD MORE +

What specifically addresses cyber-attacks against an organization's IT systems?

What specifically addresses cyber-attacks against an organization's IT systems?A . Continuity of Support PlanB . Business Continuity PlanC . Continuity of Operations PlanD . Incident Response PlanView AnswerAnswer: C

November 20, 2023No CommentsREAD MORE +

Which part of the process failed?

A company failed to detect a breach of their production system. The breach originated from a legacy system that was originally thought to be decommissioned. It turned out that system was still operating and occasionally connected to the production system for reporting purposes. Which part of the process failed?A ....

November 19, 2023No CommentsREAD MORE +

What is the effect of changing the Baseline defined in the NIST Cybersecurity Framework?

What is the effect of changing the Baseline defined in the NIST Cybersecurity Framework?A . Negative impact on recoveryB . Does not result in changes to the BIAC . Positive impact on detectionD . Review of previously generated alertsView AnswerAnswer: C

November 19, 2023No CommentsREAD MORE +

To generate an accurate risk assessment, organizations need to gather information in what areas?

To generate an accurate risk assessment, organizations need to gather information in what areas?A . Assets, Threats, Vulnerabilities, and ImpactB . Assets, Vulnerabilities, Security, and ResponseC . Inventory, Security, Response, and ImpactD . Inventory, Threats, Security, and ImpactView AnswerAnswer: A

November 18, 2023No CommentsREAD MORE +

What common process conducted by organizations when protecting digital assets is outside the scope of the NIST Cybersecurity Framework?

What common process conducted by organizations when protecting digital assets is outside the scope of the NIST Cybersecurity Framework?A . RecoverB . IdentifyC . ProtectD . InvestigateView AnswerAnswer: D

November 17, 2023No CommentsREAD MORE +

What activity informs situational awareness of the security status of an organization's systems?

What activity informs situational awareness of the security status of an organization's systems?A . IDPB . RMFC . ISCMD . DPIView AnswerAnswer: C

November 17, 2023No CommentsREAD MORE +

Which categorizations are necessary for the BIA?

You have completed a review of your current security baseline policy. In order to minimize financial, legal, and reputational damage, the baseline configuration requires that infrastructure be categorized for the BIA. Which categorizations are necessary for the BIA? A. Mission critical and business critical only B. Mission critical, safety critical,...

November 17, 2023No CommentsREAD MORE +

What is the main goal of a gap analysis in the Identify function?

What is the main goal of a gap analysis in the Identify function?A . Determine security controls to improve security measuresB . Determine actions required to get from the current profile state to the target profile stateC . Identify gaps between Cybersecurity Framework and Cyber Resilient Lifecycle pertaining to that...

November 15, 2023No CommentsREAD MORE +