Free Isaca Cybersecurity-Audit-Certificate Questions
-
-
Page: 1/27
Total 134 Questions
Question No 1
s & Answe rs PDF Wi thin the NI ST core cybersecurity framew ork, which fun ction is ass ociated with using organization al und erstand ing to mi nimi ze risk to systems, ass ets, and data?
Question No 2
s & Answe rs PDF Explanation Answe r A The “recove r” fun ction of the NI ST cybersecurity framew ork is con cerned with plann ing for resilience and tim ely repair of compromi sed capacities and service. This is because the recove r fun ction helps organizations to restore no rmal op erations as qu ickly as po ssible after a cybersecurity incident, while also learning from the incident and im proving their security po sture. The other opt ions are not part of the recove r fun ction, but rather belong to the identify (B) , respond ©, or protect (D) fun ction s. Que stion 4 Availability can be protected throu gh the use of
Question No 3
s & Answe rs PDF Which of the following wou ld provide the BEST basis for allocating propo rtion al protection activities when comprehensive class ification is not feasible?
Question No 4
s & Answe rs PDF Wi thin the NI ST core cybersecurity framew ork, which fun ction is ass ociated with using organization al und erstand ing to mi nimi ze risk to systems, ass ets, and data?
Question No 5
s & Answe rs PDF Explanation Answe r A The “recove r” fun ction of the NI ST cybersecurity framew ork is con cerned with plann ing for resilience and tim ely repair of compromi sed capacities and service. This is because the recove r fun ction helps organizations to restore no rmal op erations as qu ickly as po ssible after a cybersecurity incident, while also learning from the incident and im proving their security po sture. The other opt ions are not part of the recove r fun ction, but rather belong to the identify (B) , respond ©, or protect (D) fun ction s. Que stion 4 Availability can be protected throu gh the use of
-
Page: 1/27
Total 134 Questions
-