In the context of the Recover Function, which of the following are critical for achieving business resiliency? (Select two)

In the context of the Recover Function, which of the following are critical for achieving business resiliency? (Select two)A . Risk assessment toolsB . Disaster recovery testingC . Incident response proceduresD . Cloud-based backup solutionsView AnswerAnswer: BD

February 3, 2025 No Comments READ MORE +

The NIST Cybersecurity Framework is structured around which main elements? (Select two)

The NIST Cybersecurity Framework is structured around which main elements? (Select two)A . CoreB . TiersC . ObjectivesD . RoadmapsView AnswerAnswer: AB

February 2, 2025 No Comments READ MORE +

What is the next step required to ensure that you have an effective CSRL and a more robust cybersecurity posture in the future?

Your organization was breached. You informed the CSIRT and they contained the breach and eradicated the threat. What is the next step required to ensure that you have an effective CSRL and a more robust cybersecurity posture in the future?A . Determine change agentB . Update the BIAC . Conduct...

February 1, 2025 No Comments READ MORE +

Which category addresses the detection of unauthorized code in software?

Which category addresses the detection of unauthorized code in software?A . PR.DSB . DE.DPC . PR.ATD . DE.CMView AnswerAnswer: D

January 28, 2025 No Comments READ MORE +

What is the primary focus of the BIA?

What is the primary focus of the BIA?A . Prevents threats to the environmentB . Determines criticality of assets to the businessC . Identifies roles and responsibilities for asset recoveryD . Maintains controls for recoveryView AnswerAnswer: B

January 28, 2025 No Comments READ MORE +

In COBIT 2019, the design of a cybersecurity framework requires ___ to ensure that organizational objectives align with cybersecurity outcomes.

In COBIT 2019, the design of a cybersecurity framework requires ___ to ensure that organizational objectives align with cybersecurity outcomes.A . Governance principlesB . Communication strategiesC . Management involvementD . Framework mappingView AnswerAnswer: A

January 27, 2025 No Comments READ MORE +

In the NIST Cybersecurity Framework, which of the following components is key to ensuring continuity in critical functions after a cybersecurity event?

In the NIST Cybersecurity Framework, which of the following components is key to ensuring continuity in critical functions after a cybersecurity event?A . ProtectB . IdentifyC . RecoverD . DetectView AnswerAnswer: C

January 26, 2025 No Comments READ MORE +

How does the COBIT 2019 Framework assist organizations in managing cybersecurity risks?

How does the COBIT 2019 Framework assist organizations in managing cybersecurity risks?A . By providing technical control implementation guidanceB . By defining roles and responsibilities for governance and risk managementC . By conducting vulnerability scansD . By developing encryption standardsView AnswerAnswer: B

January 26, 2025 No Comments READ MORE +

What contains a predefined set of efforts that describes an organization’s mission/business critical processes, and defines how they will be sustained during and after a significant disruption?

What contains a predefined set of efforts that describes an organization’s mission/business critical processes, and defines how they will be sustained during and after a significant disruption?A . Disaster Recovery PlanB . Risk Assessment StrategyC . Business Continuity PlanD . Business Impact AnalysisView AnswerAnswer: C

January 24, 2025 No Comments READ MORE +

Which subcategory of the Detect Function does this activity support?

An organization’s security team is analyzing logs from its Security Information and Event Management (SIEM) system to identify unusual patterns. Which subcategory of the Detect Function does this activity support?A . Detection ProcessesB . Anomalies and EventsC . Continuous MonitoringD . Security AwarenessView AnswerAnswer: B

January 24, 2025 No Comments READ MORE +