EMC DES-9131 - Specialist - Infrastructure Security Exam
You have been tasked with documenting mission critical procedures of an organization that need to be
sustained through a significant disruption.
What document would you develop?
What must be included in the CMDB?
What are the five functions of the NIST Framework Core?
Which category addresses the detection of unauthorized code in software?
What is a consideration when performing data collection in Information Security Continuous Monitoring?
What database is used to record and manage assets?
In accordance with PR.MA, an organization has just truncated all log files that are more than 12 months old.
This has freed up 25 TB per logging server.
What must be updated once the truncation is verified?
Which NIST Cybersecurity Framework function should be executed before any others?
The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT.
Service disruption is not a concern because this server is used only to store files and does not hold any critical workload. Your company security policy required that all forensic information must be preserved.
Which actions should you take to stop data leakage and comply with requirements of the company security policy?
Which document provides an implementation plan to recover business functions and processes during and after an event?