BASE
EXAM DUMPS
DELL EMC
D-CSF-SC-01
28% OFF Automatically For You
Dell NIST Cybersecurity Framework 2.0
,1.Match each Recover Function component with its primary activity.
Component
Disaster Recovery
Business Continuity
Data Restoration
Impact Analysis
Primary Activity
A) Implementing backup solutions
B) Ensuring minimum disruption to operations
C) Recovering data post-incident
D) Assessing the effect on business and finances
A. Disaster Recovery - A
Business Continuity - B
t
en
Data Restoration - C
em
v
Impact Analysis - D
ie
ch
B. Disaster Recovery - A
A
r
ou
Business Continuity - B
Y
ce
Data Restoration - D
an
nh
Impact Analysis - C -E
C. Disaster Recovery - A
ns
io
st
Business Continuity - C
ue
Q
Data Restoration - B
m
xa
Impact Analysis - D
lE
ea
D. Disaster Recovery - B
R
h
Business Continuity - A
it
w
Data Restoration - C
)
02
8.
Impact Analysis - D
(V
ps
Answer: A
um
D
1
-0
C
S
F-
2.What is the primary focus of the BIA?
S
-C
A. Prevents threats to the environment
lD
el
B. Determines criticality of assets to the business
D
C. Identifies roles and responsibilities for asset recovery
D. Maintains controls for recovery
Answer: B
3.What are the five categories that make up the Response function?
A. Response Planning, Data Security, Communications, Analysis, and Mitigation
B. Response Planning, Communications, Analysis, Mitigation, and Improvements
C. Mitigation, Improvements, Maintenance, Response Planning, and Governance
D. Awareness and Training, Improvements, Communications, Analysis, and
, Governance
Answer: B
4.In the NIST Cybersecurity Framework, the "Tiers" component is used to assess
which of the following?
A. Cybersecurity incident response
B. The organization’s risk management maturity
C. Network encryption standards
D. The organization’s compliance with regulations
Answer: B
t
en
5.What contains a predefined set of efforts that describes an organization’s
em
v
mission/business critical processes, and defines how they will be sustained during
ie
ch
and after a significant disruption?
A
r
ou
A. Disaster Recovery Plan
Y
ce
B. Risk Assessment Strategy
an
nh
C. Business Continuity Plan -E
D. Business Impact Analysis
ns
io
st
Answer: C
ue
Q
m
xa
lE
ea
6.What entity offers a framework that is ideally suited to handle an organization's
R
h
operational challenges?
it
w
A. COBIT
)
02
8.
B. COSO
(V
ps
C. NIST
um
D. ISO
D
1
-0
Answer: D
C
S
F-
S
-C
lD
el
7.Which of the following best describes the purpose of the Detect Function within the
D
NIST Cybersecurity Framework?
A. To identify potential security incidents
B. To develop disaster recovery plans
C. To create security awareness among employees
D. To restrict access to critical systems
Answer: A
8.What type of controls are crucial within the Identify Function for inventory
classification?