Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

NIST-COBIT-2019 Exam Dumps - ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019

Go to page:
Question # 9

An organization is concerned that there will be resistance in attempts to close gaps between the current and target profiles. Which of the following is the

BEST approach to gain support for the process?

A.

Implement organization-wide training on the CSF.

B.

Communicate management opinions regarding the project.

C.

Identify quick wins for implementation first.

Full Access
Question # 10

Which of the following is an objective of Implementation Phase 3 - Where Do We Want to Be?

A.

Integrate the improvement projects into the overall program plan.

B.

Monitor, measure, and report on project progress.

C.

Create a detailed business case and high-level program plan from gathered information.

Full Access
Question # 11

During the implementation of Step 2: Orient and Step 3: Create a Current Profile, the organization's asset register should primarily align to:

A.

organizational strategy.

B.

configuration management.

C.

the security business case.

Full Access
Question # 12

Analysis is one of the categories within which of the following Core Functions?

A.

Detect

B.

Respond

C.

Recover

Full Access
Question # 13

Which of the following is the MOST critical process tool to performing Implementation Phase 3-Where Do We Want to Be?

A.

Control self-assessment

B.

Gap assessment

C.

Cost-benefit analysis

Full Access
Question # 14

Which of the following is associated with the "Detect" core function of the NIST Cybersecurity Framework?

A.

Information Protection Processes and Procedures

B.

Anomalies and Events

C.

Risk Assessment

Full Access
Question # 15

During CSF life cycle action plan review, which of the following tasks is associated with realizing benefits?

A.

Developing business cases indicating success factors

B.

Monitoring performance against objectives

C.

Documenting risk issues and remediation plans

Full Access
Go to page: