Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

DES-9131 Exam Dumps - Specialist - Infrastructure Security Exam

Question # 4

An Internet-connected file server compromised by a threat that leaked all datA. The data was destroyed to cover all tracks. The file server has high availability capabilities to handle critical workloads. The operations team took only 15 minutes to restore workload routing to a different node.

What part(s) of the CIA Triad was affected?

A.

A only

B.

C, I

C.

C, A

D.

A, I

Full Access
Question # 5

Your organization has tasked you with collecting information on all the data, personnel, devices, systems, and facilities that enable the organization to achieve its business purposes.

Which part of the NIST Cybersecurity Framework would you consult first?

A.

ID.SC

B.

DE.DP

C.

PR.AC

D.

ID.AM

Full Access
Question # 6

What determines the technical controls used to restrict access to USB devices and help prevent their use

within a company?

A.

Block use of the USB devices for all employees

B.

Written security policy prohibiting the use of the USB devices

C.

Acceptable use policy in the employee HR on-boarding training

D.

Detect use of the USB devices and report users

Full Access
Question # 7

Which NIST Cybersecurity Framework function should be executed before any others?

A.

Respond

B.

Protect

C.

Recover

D.

Identify

Full Access
Question # 8

A security engineer is responsible for monitoring company software, firmware, system OS, and applications for known vulnerabilities. How should they stay current on exploits and information security?

A.

Implement security awareness training

B.

Update company policies and procedures

C.

Revise vulnerability management plan

D.

Subscribe to security mailing lists

Full Access
Question # 9

What supports an organization in making risk management decisions to address their security posture in real time?

A.

Baseline reporting

B.

Continuous monitoring

C.

User access reviews

D.

Video surveillance

Full Access