DELL EMC D-CSF-SC-01 Übungsprüfungen
Zuletzt aktualisiert am 26.04.2025- Prüfungscode: D-CSF-SC-01
- Prüfungsname: Dell NIST Cybersecurity Framework 2.0
- Zertifizierungsanbieter: DELL EMC
- Zuletzt aktualisiert am: 26.04.2025
Which NIST Cybersecurity Framework tier describes an organization that adapts its cybersecurity practices based on evolving threats?
- A . Tier 1: Partial
- B . Tier 2: Risk-Informed
- C . Tier 3: Repeatable
- D . Tier 4: Adaptive
Which of the following is NOT a component of the NIST Cybersecurity Framework?
- A . Tiers
- B . Profiles
- C . Sectors
- D . Core functions
Which COBIT 2019 component aligns most closely with the "Respond" function of the NIST Cybersecurity Framework?
- A . Risk management
- B . Incident response
- C . Cybersecurity budgeting
- D . IT compliance
The purpose of an __________ is to evaluate the effectiveness of the response actions and identify areas for improvement after an incident.
- A . Incident Documentation
- B . After-Action Review
- C . Incident Detection
- D . Response Plan
Which of the following are key components of an effective Disaster Recovery Plan (DRP)? (Select two)
- A . Data backup procedures
- B . Threat intelligence gathering
- C . Detailed recovery timelines
- D . Continuous network monitoring
What are the four tiers of integration within the NIST Cybersecurity Framework?
- A . Selective, Repeatable, Partial, and Adaptive
- B . Partial, Risk Informed, Repeatable, and Adaptive
- C . Corrective, Risk Informed, Repeatable, and Adaptive
- D . Risk Informed, Selective, Repeatable, and Partial
Concerning a risk management strategy, what should the executive level be responsible for communicating?
- A . Risk mitigation
- B . Risk profile
- C . Risk tolerance
- D . Asset risk
What is considered outside the scope of a BIA?
- A . Estimated probability of the identified threats actually occurring
- B . Selection of full, incremental, or differential backups
- C . Efficiency and effectiveness of existing risk mitigation controls
- D . Determination of capacity requirements for backups
A healthcare organization implements strong access controls to restrict access to patient data only to authorized personnel.
Which Protect Function subcategory is this organization focusing on?
- A . Data Security
- B . Access Control
- C . Protective Technology
- D . Baseline Configuration