In the context of the Recover Function, which of the following are critical for achieving business resiliency? (Select two)
In the context of the Recover Function, which of the following are critical for achieving business resiliency? (Select two)A . Risk assessment toolsB . Disaster recovery testingC . Incident response proceduresD . Cloud-based backup solutionsView AnswerAnswer: BD
The NIST Cybersecurity Framework is structured around which main elements? (Select two)
The NIST Cybersecurity Framework is structured around which main elements? (Select two)A . CoreB . TiersC . ObjectivesD . RoadmapsView AnswerAnswer: AB
What is the next step required to ensure that you have an effective CSRL and a more robust cybersecurity posture in the future?
Your organization was breached. You informed the CSIRT and they contained the breach and eradicated the threat. What is the next step required to ensure that you have an effective CSRL and a more robust cybersecurity posture in the future?A . Determine change agentB . Update the BIAC . Conduct...
Which category addresses the detection of unauthorized code in software?
Which category addresses the detection of unauthorized code in software?A . PR.DSB . DE.DPC . PR.ATD . DE.CMView AnswerAnswer: D
What is the primary focus of the BIA?
What is the primary focus of the BIA?A . Prevents threats to the environmentB . Determines criticality of assets to the businessC . Identifies roles and responsibilities for asset recoveryD . Maintains controls for recoveryView AnswerAnswer: B
In COBIT 2019, the design of a cybersecurity framework requires ___ to ensure that organizational objectives align with cybersecurity outcomes.
In COBIT 2019, the design of a cybersecurity framework requires ___ to ensure that organizational objectives align with cybersecurity outcomes.A . Governance principlesB . Communication strategiesC . Management involvementD . Framework mappingView AnswerAnswer: A
In the NIST Cybersecurity Framework, which of the following components is key to ensuring continuity in critical functions after a cybersecurity event?
In the NIST Cybersecurity Framework, which of the following components is key to ensuring continuity in critical functions after a cybersecurity event?A . ProtectB . IdentifyC . RecoverD . DetectView AnswerAnswer: C
How does the COBIT 2019 Framework assist organizations in managing cybersecurity risks?
How does the COBIT 2019 Framework assist organizations in managing cybersecurity risks?A . By providing technical control implementation guidanceB . By defining roles and responsibilities for governance and risk managementC . By conducting vulnerability scansD . By developing encryption standardsView AnswerAnswer: B
What contains a predefined set of efforts that describes an organization’s mission/business critical processes, and defines how they will be sustained during and after a significant disruption?
What contains a predefined set of efforts that describes an organization’s mission/business critical processes, and defines how they will be sustained during and after a significant disruption?A . Disaster Recovery PlanB . Risk Assessment StrategyC . Business Continuity PlanD . Business Impact AnalysisView AnswerAnswer: C
Which subcategory of the Detect Function does this activity support?
An organization’s security team is analyzing logs from its Security Information and Event Management (SIEM) system to identify unusual patterns. Which subcategory of the Detect Function does this activity support?A . Detection ProcessesB . Anomalies and EventsC . Continuous MonitoringD . Security AwarenessView AnswerAnswer: B