Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca NIST-COBIT-2019 - ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019

Page: 2 / 2
Total 50 questions

Which of the following functions provides foundational activities for the effective use of the Cybersecurity Framework?

A.

Protect

B.

Identify

C.

Detect

Identifying external compliance requirements is MOST likely to occur during which of the following COBIT implementation phases?

A.

Phase 4 - What Needs to Be Done?

B.

Phase 2 - Where Are We Now?

C.

Phase 3 - Where Do We Want to Be?

Analysis is one of the categories within which of the following Core Functions?

A.

Detect

B.

Respond

C.

Recover

The CSF Implementation Tiers distinguish three fundamental dimensions of risk management to help enterprises evaluate which of the following?

A.

Cybersecurity posture

B.

Cybersecurity threats

C.

Cybersecurity landscape

The goals cascade supports prioritization of management objectives based on:

A.

the prioritization of enterprise goals.

B.

the prioritization of business objectives.

C.

the prioritization of stakeholder needs.