Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

EMC DES-9131 - Specialist - Infrastructure Security Exam

Page: 2 / 2
Total 60 questions

A new employee is starting work at your company. When should they be informed of the company’s security policy?

A.

Based on human resource policy

B.

After the first security infraction

C.

Annual security policy review

D.

During regular security awareness sessions

The Backup Recovery Plan is dependent on what effort?

A.

PR.DS

B.

RTO

C.

BIA

D.

SDLC

Refer to the exhibit.

What type of item appears in the second column of the table?

A.

Subcategory

B.

Informative Reference

C.

Function

D.

Tier

You need to review your current security baseline policy for your company and determine which security

controls need to be applied to the baseline and what changes have occurred since the last update.

Which category addresses this need?

A.

ID.AM

B.

PR.IP

C.

PR.MA

D.

ID.SC

What process is used to identify an organization’s physical, digital, and human resource, as required in their Business Impact Analysis?

A.

Risk Management Strategy

B.

Risk Assessment

C.

Risk Treatment

D.

Asset Inventory

What defines who is accountable for contacting operational teams, managers, and others affected by a

localized, safety critical event?

A.

Asset Management Plan

B.

Business Impact Analysis

C.

Business Continuity Plan

D.

Incident Response Plan

An Internet-connected file server compromised by a threat that leaked all datA. The data was destroyed to cover all tracks. The file server has high availability capabilities to handle critical workloads. The operations team took only 15 minutes to restore workload routing to a different node.

What part(s) of the CIA Triad was affected?

A.

A only

B.

C, I

C.

C, A

D.

A, I

During what activity does an organization identify and prioritize technical, organizational, procedural,

administrative, and physical security weaknesses?

A.

Table top exercise

B.

Penetration testing

C.

Vulnerability assessment

D.

White box testing