Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A security engineer is responsible for monitoring company software, firmware, system OS, and applications for known vulnerabilities. How should they stay current on exploits and information security?

A.

Implement security awareness training

B.

Update company policies and procedures

C.

Revise vulnerability management plan

D.

Subscribe to security mailing lists

In accordance with PR.MA, an organization has just truncated all log files that are more than 12 months old.

This has freed up 25 TB per logging server.

What must be updated once the truncation is verified?

A.

SDLC

B.

IRP

C.

Baseline

D.

ISCM

What database is used to record and manage assets?

A.

Configuration Management Database

B.

Asset Inventory Management Database

C.

High Availability Mirrored Database

D.

Patch Management Inventory Database

The CSF recommends that the Communication Plan for an IRP include audience, method of communication, frequency, and what other element?

A.

Incident category

B.

Message criteria

C.

Incident severity

D.

Templates to use

What are the five functions of the NIST Framework Core?

A.

Identify, Protect, Detect, Respond, and Recover

B.

Governance, Identify, Recover, Respond, and Recover

C.

Protect, Detect, Respond, Governance, and Recover

D.

Identify, Respond, Protect, Detect, and Governance

What common process conducted by organizations when protecting digital assets is outside the scope of the NIST Cybersecurity Framework?

A.

Recover

B.

Identify

C.

Protect

D.

Investigate

What contains a predefined set of efforts that describes an organization’s mission/business critical processes, and defines how they will be sustained during and after a significant disruption?

A.

Disaster Recovery Plan

B.

Risk Assessment Strategy

C.

Business Continuity Plan

D.

Business Impact Analysis

What are the four tiers of integration within the NIST Cybersecurity Framework?

A.

Selective, Repeatable, Partial, and Adaptive

B.

Partial, Risk Informed, Repeatable, and Adaptive

C.

Corrective, Risk Informed, Repeatable. and Adaptive

D.

Risk Informed, Selective, Repeatable, and Partial