DELL EMC D-CSF-SC-01 Übungsprüfungen
Zuletzt aktualisiert am 27.04.2025- Prüfungscode: D-CSF-SC-01
- Prüfungsname: Dell NIST Cybersecurity Framework 2.0
- Zertifizierungsanbieter: DELL EMC
- Zuletzt aktualisiert am: 27.04.2025
In the context of the Protect Function, what is the primary role of a Business Continuity Plan (BCP)?
- A . To facilitate quick recovery after a cybersecurity incident
- B . To create a communication protocol with stakeholders
- C . To monitor network traffic for anomalies
- D . To assess risk levels for various assets
What is the primary function of the Identify section in the NIST Cybersecurity Framework?
- A . Detecting and responding to cyber incidents
- B . Managing access to assets
- C . Understanding the organization’s context and risk tolerance
- D . Recovering from cybersecurity incidents
You need to review your current security baseline policy for your company and determine which security controls need to be applied to the baseline and what changes have occurred since the last update.
Which category addresses this need?
- A . ID.AM
- B . PR.IP
- C . PR.MA
- D . ID.SC
COBIT 2019 helps organizations implement the NIST Cybersecurity Framework by providing which key capability?
- A . Risk prioritization and assessment tools
- B . Network security configuration guidelines
- C . Vendor risk management policies
- D . User awareness programs
Which of the following is a primary goal of COBIT 2019 when implementing the NIST Cybersecurity Framework?
- A . Managing IT performance
- B . Enhancing cybersecurity governance
- C . Reducing network downtime
- D . Improving employee awareness
The ___ function in the NIST Cybersecurity Framework is responsible for developing and implementing appropriate safeguards to protect services.
- A . Detect
- B . Identify
- C . Protect
- D . Recover
A security audit of the systems on a network must be performed to determine their compliance with security policies.
Which control should be used for the audit?
- A . PR.DS
- B . DE.CM
- C . RS.MI
- D . ID.AM
What contains a predefined set of efforts that describes an organization’s mission/business critical processes, and defines how they will be sustained during and after a significant disruption?
- A . Disaster Recovery Plan
- B . Risk Assessment Strategy
- C . Business Continuity Plan
- D . Business Impact Analysis
What supports an organization in making risk management decisions to address their security posture in real time?
- A . Baseline reporting
- B . Continuous monitoring
- C . User access reviews
- D . Video surveillance
When evaluating a cybersecurity framework, COBIT 2019 emphasizes ___ as a key design factor for tailoring the framework to the organization.
- A . Compliance obligations
- B . Organizational risk appetite
- C . Current technology infrastructure
- D . Employee cybersecurity training