Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An r2 Requirement Statement that scores at a 37 would yield which result?

A.

No Gap

B.

HITRUST Certification

C.

Risk Acceptance

D.

Function Gap

E.

Gap with possible required CAP

Which AI models can be evaluated using the A1 Security Assessment?

A.

Hodgkin-Huxley

B.

Predictive

C.

Back Propagation

D.

Generative

E.

Rule-Based

A validated assessment is only available to organizations after performing a readiness assessment. [0020]

A.

True

B.

False

Management has asked you to scope out an assessment including your entire network. What are some examples you may see listed as a primary scoping component?

A.

Hypervisor

B.

Server

C.

Oracle database

D.

Smoke detectors

E.

Network attached storage device

To place reliance on a point-in-time assessment report, the issue date must be within two years from the assessment fieldwork start date. [0078]

A.

True

B.

False

The A1 Security Assessment requirements can only be added to the r2 assessment type.

A.

True

B.

False

Is the Payment Card Industry – Data Security Standard (PCI-DSS) a Risk Management Framework (RMF)?

A.

Yes

B.

No

When creating a new r2 assessment you are required to use the latest version of the HITRUST CSF.

A.

True

B.

False

How is the sample of Requirement Statements within an interim assessment selected for testing?

A.

By the assessor personnel

B.

By client personnel

C.

Randomly by the MyCSF tool

D.

Any with associated gaps

E.

Any with required CAPs

Which of the following must be confirmed before inheriting requirement scores?

A.

The requirement Cross Version IDs (CVIDs) must match

B.

The requirement must be partially or fully inheritable

C.

The provider must have published the assessment for inheritance

D.

All of the above