<< Prev Question Next Question >>

Question 15/28

Your organization has tasked you with collecting information on all the data, personnel, devices, systems,
and facilities that enable the organization to achieve its business purposes.
Which part of the NIST Cybersecurity Framework would you consult first?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (28q)
Question 1: A company suffers a data breach and determines that the thre...
Question 2: Assume that a DDoS attack has been occurring for 72 minutes....
Question 3: The project manager of a data center has a budget of $1,500,...
Question 4: What are the four tiers of integration within the NIST Cyber...
Question 5: What determines the technical controls used to restrict acce...
Question 6: What is considered outside the scope of a BIA?...
Question 7: Which NIST Cybersecurity Framework function should be execut...
Question 8: Refer to the exhibit. (Exhibit) Your organization's security...
Question 9: The CSIRT team is following the existing recovery plans on n...
Question 10: A security audit of the systems on a network must be perform...
Question 11: An organization has a policy to respond "ASAP" to security i...
Question 12: What defines who is accountable for contacting operational t...
Question 13: Refer to the exhibit. (Exhibit) What type of item appears in...
Question 14: A company implemented an intrusion detection system. They no...
Question 15: Your organization has tasked you with collecting information...
Question 16: You have been tasked with documenting mission critical proce...
Question 17: What type of system processes information, the loss of which...
Question 18: When should event analysis be performed?...
Question 19: The Backup Recovery Plan is dependent on what effort?...
Question 20: What process is used to identify an organization's physical,...
Question 21: What procedure is designed to enable security personnel to d...
Question 22: What must be included in the CMDB?...
Question 23: What must be done before returning a compromised laptop to n...
Question 24: Concerning a risk management strategy, what should the execu...
Question 25: Your firewall blocked several machines on your network from ...
Question 26: In accordance with PR.MA, an organization has just truncated...
Question 27: Which document is designed to limit damage, reduce recovery ...
Question 28: A new employee is starting work at your company. When should...