DELL EMC D-CSF-SC-01 Übungsprüfungen
Zuletzt aktualisiert am 26.04.2025- Prüfungscode: D-CSF-SC-01
- Prüfungsname: Dell NIST Cybersecurity Framework 2.0
- Zertifizierungsanbieter: DELL EMC
- Zuletzt aktualisiert am: 26.04.2025
Your organization has tasked you with collecting information on all the data, personnel, devices, systems, and facilities that enable the organization to achieve its business purposes.
Which part of the NIST Cybersecurity Framework would you consult first?
- A . ID.SC
- B . DE.DP
- C . PR.AC
- D . ID.AM
What type of system processes information, the loss of which would have a debilitating impact to an organization?
- A . Mission critical
- B . Security critical
- C . Business critical
- D . Safety critical
A financial institution has deployed Intrusion Detection Systems (IDS) to monitor network traffic for unusual activity.
This aligns with which Detect Function subcategory?
- A . Detection Processes
- B . Risk Assessment
- C . Continuous Monitoring
- D . Asset Management
Which document provides an implementation plan to recover business functions and processes during and after an event?
- A . Business Continuity Plan
- B . Disaster Recovery Plan
- C . Risk Assessment Strategy
- D . Business Impact Analysis
What constitutes the main objectives of the Recovery function?
- A . Restore workloads, assets, and audit logs
- B . Restore services, mitigate risks, and improve
- C . Restore backups, analyze threats, and monitor backup integrity
- D . Restore assets, workloads, and services
What is the function of the "Identify" core in the NIST Cybersecurity Framework?
- A . To implement incident response procedures
- B . To understand the business context and resources
- C . To perform risk mitigation
- D . To perform real-time monitoring of cybersecurity events
The CSF recommends that the Communication Plan for an IRP include audience, method of communication, frequency, and what other element?
- A . Incident category
- B . Message criteria
- C . Incident severity
- D . Templates to use
What activity informs situational awareness of the security status of an organization’s systems?
- A . IDP
- B . RMF
- C . ISCM
- D . DPI
An organization is creating a disaster recovery plan. They want to ensure all critical assets are accounted for and prioritized.
Which component of the Identify Function should they emphasize?
- A . Maintenance of access control lists
- B . Continuously updated inventory of assets
- C . Implementation of endpoint detection
- D . Real-time threat intelligence feeds
What must be done before returning a compromised laptop to normal operations in the environment?
- A . Perform a virus scan
- B . Eliminate the root cause of the compromise
- C . Re-image the device
- D . Device cannot be returned to the environment