Which part of the IRP does the team need to implement or update?

An organization has a policy to respond “ASAP” to security incidents. The security team is having a difficult time prioritizing events because they are responding to all of them, in order of receipt. Which part of the IRP does the team need to implement or update?A . Scheduling of incident...

March 18, 2025 No Comments READ MORE +

What is a consideration when performing data collection in Information Security Continuous Monitoring?

What is a consideration when performing data collection in Information Security Continuous Monitoring?A . Data collection efficiency is increased through automation.B . The more data collected, the better chances to catch an anomaly.C . Collection is used only for compliance requirements.D . Data is best captured as it traverses the...

March 18, 2025 No Comments READ MORE +

What needs to be done next?

Your organization has been breached. The attacker has sent an email demanding $100,000 in cryptocurrency in exchange for not dumping all your customer information onto the dark web. Following the RACI Matrix model outlined in your IRP, you have informed all parties, contained the breach, and eradicated the threat. What...

March 17, 2025 No Comments READ MORE +

How does COBIT 2019 enhance the implementation of the NIST Cybersecurity Framework?

How does COBIT 2019 enhance the implementation of the NIST Cybersecurity Framework?A . By providing detailed technical configurationsB . By offering a governance structure for managing risksC . By aligning with external vendor practicesD . By defining specific recovery processesView AnswerAnswer: B

March 13, 2025 No Comments READ MORE +

The ___ function in the NIST Cybersecurity Framework is responsible for identifying vulnerabilities and threats that may affect the organization.

The ___ function in the NIST Cybersecurity Framework is responsible for identifying vulnerabilities and threats that may affect the organization.A . ProtectB . IdentifyC . DetectD . RecoverView AnswerAnswer: B

March 13, 2025 No Comments READ MORE +

Which tools can support the Detect Function's goal of identifying cybersecurity events? (Select two)

Which tools can support the Detect Function's goal of identifying cybersecurity events? (Select two)A . Intrusion Detection Systems (IDS)B . Identity and Access Management (IAM)C . Security Information and Event Management (SIEM)D . Disaster Recovery Planning (DRP) toolsView AnswerAnswer: AC

March 10, 2025 No Comments READ MORE +

Which control should be used for the audit?

A security audit of the systems on a network must be performed to determine their compliance with security policies. Which control should be used for the audit?A . PR.DSB . DE.CMC . RS.MID . ID.AMView AnswerAnswer: A

March 9, 2025 No Comments READ MORE +

Match the following components of the Identify Function with their main purpose.

Match the following components of the Identify Function with their main purpose. Component Asset Inventory Risk Assessment Classification Controls Business Impact Analysis Purpose A) Listing and updating assets needing cybersecurity B) Determining likelihood and impact of cybersecurity risks C) Categorizing assets based on criticality D) Identifying essential business functions for...

March 8, 2025 No Comments READ MORE +

Match each Respond Function component with its primary purpose.

Match each Respond Function component with its primary purpose. Component Containment Communications Plan Incident Analysis After-Action Review Purpose A) Limiting the spread of the incident B) Guidelines for internal and external updates C) Identifying the root cause of the incident D) Evaluating response effectivenessA . Containment - A Communications Plan...

March 7, 2025 No Comments READ MORE +

A key consideration in implementing a Disaster Recovery Plan (DRP) is the __________, which defines how quickly systems need to be restored.

A key consideration in implementing a Disaster Recovery Plan (DRP) is the __________, which defines how quickly systems need to be restored.A . Recovery Time Objective (RTO)B . Business Impact Assessment (BIA)C . Cyber Resilience ProtocolD . Security Control EvaluationView AnswerAnswer: A

February 24, 2025 No Comments READ MORE +