ISACA NIST-COBIT-2019 ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019 Online Training
ISACA NIST-COBIT-2019 Online Training
The questions for NIST-COBIT-2019 were last updated at Feb 20,2025.
- Exam Code: NIST-COBIT-2019
- Exam Name: ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019
- Certification Provider: ISACA
- Latest update: Feb 20,2025
Which of the following is a framework principle established by NIST as an initial framework consideration?
- A . Avoiding business risks
- B . Impact on global operations
- C . Ensuring regulatory compliance
Which role will benefit MOST from a better understanding of the current cybersecurity posture by applying the CSF?
- A . Executives
- B . Acquisition specialists
- C . Legal experts
When coordinating framework implementation, the business/process level collaborates with the implementation/operations level to:
- A . develop the risk management framework.
- B . assess changes in current and future risks.
- C . create the framework profile.
Which of the following COBIT 2019 governance principles corresponds to the CSF application stating that CSF profiles support flexibility in content and structure?
- A . A governance system should be customized to the enterprise needs, using a set of design factors as parameters.
- B . A governance system should focus primarily on the enterprise’s IT function and information processing.
- C . A governance system should clearly distinguish between governance and management activities and structures.
Which of the following functions provides foundational activities for the effective use of the Cybersecurity Framework?
- A . Protect
- B . Identify
- C . Detect
What does a CSF Informative Reference within the CSF Core provide?
- A . A high-level strategic view of the life cycle of an organization’s management of cybersecurity risk
- B . A group of cybersecurity outcomes tied to programmatic needs and particular activities
- C . Specific sections of standards, guidelines, and practices that illustrate a method to achieve an associated outcome
Analysis is one of the categories within which of the following Core Functions?
- A . Detect
- B . Respond
- C . Recover
Which of the following is associated with the "Detect" core function of the NIST Cybersecurity Framework?
- A . Information Protection Processes and Procedures
- B . Anomalies and Events
- C . Risk Assessment
Within the CSF Core structure, which type of capability can be implemented to help practitioners recognize potential or realized risk to enterprise assets?
- A . Protection capability
- B . Response capability
- C . Detection capability
The CSF Implementation Tiers distinguish three fundamental dimensions of risk management to help enterprises evaluate which of the following?
- A . Cybersecurity posture
- B . Cybersecurity threats
- C . Cybersecurity landscape