Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

NIST-COBIT-2019 Exam Dumps - ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019

Question # 4

Which of the following is one of the objectives of CSF Step 6: Determine, Analyze and Prioritize Gaps?

A.

Translate improvement opportunities into justifiable, contributing projects.

B.

Direct stakeholder engagement, communication, and reporting.

C.

Communicate the I&T strategy and direction.

Full Access
Question # 5

The CSF Implementation Tiers distinguish three fundamental dimensions of risk management to help enterprises evaluate which of the following?

A.

Cybersecurity posture

B.

Cybersecurity threats

C.

Cybersecurity landscape

Full Access
Question # 6

Which function of the CSF is addressed by incorporating governance, risk, and compliance (GRC) elements into the implementation plan?

A.

Protect

B.

Detect

C.

Identify

Full Access
Question # 7

The PRIMARY function of COBIT Implementation Phase 7: How Do We Keep the Momentum Going is to provide an opportunity for which of the

following?

A.

Closing the loop for communication workflow

B.

Documenting improvements in a prioritized action plan

C.

Ensuring frequent stakeholder communication

Full Access
Question # 8

During Step 3: Create a Current Profile, an enterprise outcome has reached a 95% subcategory maturity level. How would this level of achievement be

described in the COBIT Performance Management Rating Scale?

A.

Largely Achieved

B.

Partially Achieved

C.

Fully Achieved

Full Access
Question # 9

An organization is concerned that there will be resistance in attempts to close gaps between the current and target profiles. Which of the following is the

BEST approach to gain support for the process?

A.

Implement organization-wide training on the CSF.

B.

Communicate management opinions regarding the project.

C.

Identify quick wins for implementation first.

Full Access
Question # 10

Which of the following is an objective of Implementation Phase 3 - Where Do We Want to Be?

A.

Integrate the improvement projects into the overall program plan.

B.

Monitor, measure, and report on project progress.

C.

Create a detailed business case and high-level program plan from gathered information.

Full Access
Question # 11

During the implementation of Step 2: Orient and Step 3: Create a Current Profile, the organization's asset register should primarily align to:

A.

organizational strategy.

B.

configuration management.

C.

the security business case.

Full Access
Question # 12

Analysis is one of the categories within which of the following Core Functions?

A.

Detect

B.

Respond

C.

Recover

Full Access
Question # 13

Which of the following is the MOST critical process tool to performing Implementation Phase 3-Where Do We Want to Be?

A.

Control self-assessment

B.

Gap assessment

C.

Cost-benefit analysis

Full Access
Question # 14

Which of the following is associated with the "Detect" core function of the NIST Cybersecurity Framework?

A.

Information Protection Processes and Procedures

B.

Anomalies and Events

C.

Risk Assessment

Full Access
Question # 15

During CSF life cycle action plan review, which of the following tasks is associated with realizing benefits?

A.

Developing business cases indicating success factors

B.

Monitoring performance against objectives

C.

Documenting risk issues and remediation plans

Full Access