Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Your firewall blocked several machines on your network from connecting to a malicious IP address. After

reviewing the logs, the CSIRT discovers all Microsoft Windows machines on the network have been affected based on a newly published CVE.

Based on the IRP, what should be done immediately?

A.

Update the asset inventory

B.

Contain the breach

C.

Eradicate the breach

D.

Revise the IRP

Full Access
Question # 5

Which NIST Cybersecurity Framework function should be executed before any others?

A.

Respond

B.

Protect

C.

Recover

D.

Identify

Full Access
Question # 6

During what activity does an organization identify and prioritize technical, organizational, procedural,

administrative, and physical security weaknesses?

A.

Table top exercise

B.

Penetration testing

C.

Vulnerability assessment

D.

White box testing

Full Access
Question # 7

The CSF recommends that the Communication Plan for an IRP include audience, method of communication, frequency, and what other element?

A.

Incident category

B.

Message criteria

C.

Incident severity

D.

Templates to use

Full Access
Question # 8

What are the four tiers of integration within the NIST Cybersecurity Framework?

A.

Selective, Repeatable, Partial, and Adaptive

B.

Partial, Risk Informed, Repeatable, and Adaptive

C.

Corrective, Risk Informed, Repeatable. and Adaptive

D.

Risk Informed, Selective, Repeatable, and Partial

Full Access
Question # 9

Which NIST Cybersecurity Framework category ensures that organizational communication and data flows are mapped?

A.

ID.AM

B.

ID.GV

C.

ID.RA

D.

ID.SC

Full Access