DELL EMC D-CSF-SC-01 Übungsprüfungen
Zuletzt aktualisiert am 27.04.2025- Prüfungscode: D-CSF-SC-01
- Prüfungsname: Dell NIST Cybersecurity Framework 2.0
- Zertifizierungsanbieter: DELL EMC
- Zuletzt aktualisiert am: 27.04.2025
In COBIT 2019, the design of a cybersecurity framework requires ___ to ensure that organizational objectives align with cybersecurity outcomes.
- A . Governance principles
- B . Communication strategies
- C . Management involvement
- D . Framework mapping
Which category addresses the detection of unauthorized code in software?
- A . PR.DS
- B . DE.DP
- C . PR.AT
- D . DE.CM
The Backup Recovery Plan is dependent on what effort?
- A . PR.DS
- B . RTO
- C . BIA
- D . SDLC
The warranty on your organization’s air conditioning system has expired. No alert was sent to anyone within the organization. During an extended number of days of record heat, the air conditioning units fail. However, maintenance personnel will not work on non-warrantied systems.
Failing to catalog warranty information about the air conditioning units is a failure in which function?
- A . Protect
- B . Identify
- C . Detect
- D . Recover
In the NIST Cybersecurity Framework, which of the following components is key to ensuring continuity in critical functions after a cybersecurity event?
- A . Protect
- B . Identify
- C . Recover
- D . Detect
The Identify Function helps establish a ___________ to assess and categorize organizational assets by their importance.
- A . Baseline configuration
- B . Risk mitigation strategy
- C . Comprehensive inventory
- D . Security awareness program
A key consideration in implementing a Disaster Recovery Plan (DRP) is the __________, which defines how quickly systems need to be restored.
- A . Recovery Time Objective (RTO)
- B . Business Impact Assessment (BIA)
- C . Cyber Resilience Protocol
- D . Security Control Evaluation
The primary goal of the COBIT 2019 governance system is to ensure that ___ aligns with the overall business strategy.
- A . Cybersecurity risks
- B . IT operations
- C . Network uptime
- D . External compliance standards
Which document identifies cash flow losses, cost of equipment replacement, salaries paid for backlog, and financial loss linked to failures?
- A . Business Impact Analysis
- B . Disaster Recovery Plan
- C . Business Continuity Plan
- D . Risk Assessment Strategy
Your organization was breached. You informed the CSIRT and they contained the breach and eradicated the threat.
What is the next step required to ensure that you have an effective CSRL and a more robust cybersecurity posture in the future?
- A . Determine change agent
- B . Update the BIA
- C . Conduct a gap analysis
- D . Update the BCP