DELL EMC D-CSF-SC-01 Übungsprüfungen
Zuletzt aktualisiert am 27.04.2025- Prüfungscode: D-CSF-SC-01
- Prüfungsname: Dell NIST Cybersecurity Framework 2.0
- Zertifizierungsanbieter: DELL EMC
- Zuletzt aktualisiert am: 27.04.2025
In which function is the SDLC implemented?
- A . Respond
- B . Protect
- C . Detect
- D . Recover
A retail company experiences a data breach affecting customer records. The Incident Response Plan calls for immediate containment and communication with affected customers.
Which Respond Function subcategories are directly addressed in this response?
- A . Detection and Analysis
- B . Containment and Communication
- C . Recovery and Documentation
- D . Risk Assessment and Training
Which element of the NIST Cybersecurity Framework aligns with COBIT 2019’s governance model for managing cybersecurity risk?
- A . Protect
- B . Respond
- C . Identify
- D . Detect
___________ is a critical component of the Detect Function, focusing on observing network traffic in real-time to identify potential security incidents.
- A . Data Classification
- B . Continuous Monitoring
- C . Access Control
- D . Awareness Training
Which document is designed to limit damage, reduce recovery time, and reduce costs where possible to the organization?
- A . Business Impact Analysis
- B . Business Continuity Plan
- C . Risk Assessment Strategy
- D . Incident Response Plan
A ___________ provides an organization with a detailed understanding of its assets, guiding the configuration of protective technologies within the Protect Function.
- A . Baseline Configuration
- B . Threat Intelligence Plan
- C . Recovery Strategy
- D . Communication Plan
What should an organization use to effectively mitigate against password sharing to prevent unauthorized access to systems?
- A . Access through a ticketing system
- B . Frequent password resets
- C . Strong password requirements
- D . Two factor authentication
What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and recover from malicious computer incidents such as unauthorized changes to system hardware, software, or data?
- A . Emergency Analysis Plan
- B . Crisis Communication Plan
- C . Disaster Recovery Plan
- D . Incident Response Plan
One of the five core functions in the NIST Cybersecurity Framework is ___, which focuses on minimizing the impact of cybersecurity events.
- A . Recover
- B . Detect
- C . Protect
- D . Respond
What is a valid order of steps from the Incident Response Lifecycle?
- A . Preparation
Eradication
Containment
Analysis
Recovery - B . Containment
Detection
Analysis
Eradication
Prevention - C . Containment
Analysis
Detection
Eradication
Communication - D . Preparation
Detection
Containment
Eradication
Recovery