New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NIST-COBIT-2019 Questions and Answers

Question # 6

Which role will benefit MOST from a better understanding of the current cybersecurity posture by applying the CSF?

A.

Executives

B.

Acquisition specialists

C.

Legal experts

Full Access
Question # 7

Which of the following is associated with the "Detect" core function of the NIST Cybersecurity Framework?

A.

Information Protection Processes and Procedures

B.

Anomalies and Events

C.

Risk Assessment

Full Access
Question # 8

The activity of determining an appropriate target capability level for each process occurs within which implementation phase?

A.

Phase 4 - What Needs to Be Done?

B.

Phase 3 - Where Do We Want to Be?

C.

Phase 2 - Where Are We Now?

Full Access
Question # 9

How should gaps identified between the current and target profiles be addressed?

A.

Comparing to and acting on the desired Tier level

B.

With a full project engagement to close all gaps

C.

Through a risk based-approach

Full Access
Question # 10

Analysis is one of the categories within which of the following Core Functions?

A.

Detect

B.

Respond

C.

Recover

Full Access
Question # 11

Which of the following should an organization review to gain a better understanding of the likelihood and impact of cybersecurity events?

A.

Relevant internal or external capability benchmarks

B.

Cybersecurity frameworks, standards, and guidelines

C.

Cyber threat information from internal and external sources

Full Access
Question # 12

Which of the following is a PRIMARY input into Steps 2 and 3: Orient and Create a Current Profile?

A.

Evaluating business cases

B.

Updating business cases

C.

Defining business cases

Full Access
Question # 13

When aligning to the NIST Cybersecurity Framework, what should occur after tier levels and framework core outcomes are determined?

A.

Report discovered issues to senior management.

B.

Assign mitigating control development.

C.

Compare current and target profiles.

Full Access
Question # 14

Which of the following is the MOST beneficial result of an effective CSF implementation plan?

A.

Cybersecurity risk management practices are formalized and institutionalized.

B.

Key stakeholders understand the quick wins of the cybersecurity program.

C.

Key stakeholders understand the cybersecurity requirements of the chosen vendors.

Full Access
Question # 15

What is the MOST important reason to compare framework profiles?

A.

To improve security posture

B.

To conduct a risk assessment

C.

To identify gaps

Full Access