Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca NIST-COBIT-2019 - ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019

Page: 1 / 2
Total 50 questions

Which of the following is the MOST important input for prioritizing resources during program initiation?

A.

Replacement cost

B.

Risk register

C.

Business impact assessment

Which information should be collected for a Current Profile?

A.

Implementation Status

B.

Recommended Actions

C.

Resource Required

Which of the following is the MOST critical process tool to performing Implementation Phase 3-Where Do We Want to Be?

A.

Control self-assessment

B.

Gap assessment

C.

Cost-benefit analysis

An organization is concerned that there will be resistance in attempts to close gaps between the current and target profiles. Which of the following is the

BEST approach to gain support for the process?

A.

Implement organization-wide training on the CSF.

B.

Communicate management opinions regarding the project.

C.

Identify quick wins for implementation first.

Which of the following is CRITICAL for the success of CSF Step 6: Determine, Analyze and Prioritize Gaps?

A.

Identification of threats and vulnerabilities related to key assets

B.

Experience in behavioral and change management

C.

Clear understanding of the likelihood and impact of cybersecurity events

During the implementation of Step 2: Orient and Step 3: Create a Current Profile, the organization's asset register should primarily align to:

A.

organizational strategy.

B.

configuration management.

C.

the security business case.

Which of the following is an important consideration when defining the roadmap in COBIT Implementation Phase 3 - Where Do We Want to Be?

A.

Agreed metrics for measuring outcomes

B.

Reporting procedures and requirements

C.

Change-enablement implications

Which of the following should an organization review to gain a better understanding of the likelihood and impact of cybersecurity events?

A.

Relevant internal or external capability benchmarks

B.

Cybersecurity frameworks, standards, and guidelines

C.

Cyber threat information from internal and external sources

Which of the following represents a best practice for completing CSF Step 3: Create a Current Profile?

A.

Procuring solutions that are cost-effective and fit the organization's technical architecture

B.

Assessing current availability, performance, and capacity to create a baseline

C.

Engaging in a dialogue and obtaining input to determine appropriate goals, tiers, and

Activities

What does a CSF Informative Reference within the CSF Core provide?

A.

A high-level strategic view of the life cycle of an organization's management of cybersecurity risk

B.

A group of cybersecurity outcomes tied to programmatic needs and particular activities

C.

Specific sections of standards, guidelines, and practices that illustrate a method to achieve an associated outcome