DELL EMC D-CSF-SC-01 Übungsprüfungen
Zuletzt aktualisiert am 26.04.2025- Prüfungscode: D-CSF-SC-01
- Prüfungsname: Dell NIST Cybersecurity Framework 2.0
- Zertifizierungsanbieter: DELL EMC
- Zuletzt aktualisiert am: 26.04.2025
A healthcare organization implements strong access controls to restrict access to patient data only to authorized personnel.
Which Protect Function subcategory is this organization focusing on?
- A . Data Security
- B . Access Control
- C . Protective Technology
- D . Baseline Configuration
COBIT 2019 complements the NIST Cybersecurity Framework by focusing on ___ governance and management objectives.
- A . IT
- B . Risk
- C . Security
- D . Operational
The ___ function of the NIST Cybersecurity Framework ensures timely identification of cybersecurity events.
- A . Respond
- B . Identify
- C . Detect
- D . Recover
A company is conducting awareness training for all employees to recognize phishing attacks.
This activity aligns with which part of the Protect Function?
- A . Access Control
- B . Protective Technology
- C . Awareness and Training
- D . Data Security
What corporate strategy is used to guide efforts after a catastrophic event and is implemented to ensure the return to normal business activity?
- A . Disaster Recovery Plan
- B . Continuity of Operations Plan
- C . Contingency Plan
- D . Business Continuity Plan
The information security manager for a major web based retailer has determined that the product catalog database is corrupt. The business can still accept orders online but the products cannot be updated. Expected downtime to rebuild is roughly four hours.
What type of asset should the product catalog database be categorized as?
- A . Mission critical
- B . Safety critical
- C . Non-critical
- D . Business critical
What could be considered a set of cybersecurity activities, desired outcomes, and applicable references that are common across critical infrastructure sectors and align to five concurrent and continuous functions?
- A . Baseline
- B . Core
- C . Profile
- D . Governance
The CSIRT team is following the existing recovery plans on non-production systems in a PRE-BREACH scenario.
This action is being executed in which function?
- A . Protect
- B . Recover
- C . Identify
- D . Respond
A bank has been alerted to a breach of its reconciliation systems. The notification came from the cybercriminals claiming responsibility in an email to the CEO. The CEO has alerted the company CSIRT.
What does the Communication Plan for the IRP specifically guide against?
- A . Transfer of chain of custody
- B . Accelerated turn over
- C . Rushed disclosure
- D . Initiating kill chain
The Cybersecurity Framework core consists of how many categories?
- A . 10
- B . 16
- C . 23
- D . 28