ExamGecko
Home / Isaca / NIST-COBIT-2019 / List of questions
Ask Question

Isaca NIST-COBIT-2019 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

Which of the following is MOST important for successful execution of CSF implementation Step 6 - Determine, Analyze, and Prioritize Gaps?

Have management review and approve the gap analysis.

Have management review and approve the gap analysis.

Engage external experts to perform a cost-benefit analysis.

Engage external experts to perform a cost-benefit analysis.

Engage business and IT process owners for internal expertise.

Engage business and IT process owners for internal expertise.

Suggested answer: C
Explanation:

According to the ISACA guide, engaging business and IT process owners for internal expertise is most important for successful execution of CSF implementation Step 6, as they can provide valuable insights into the current and desired states of the processes, the gaps and potential solutions, and the costs and benefits of the implementation1. They can also help to align the cybersecurity program with the business objectives and risk appetite of the organization.

Reference Implementing the NIST Cybersecurity Framework Using COBIT 2019, page 17.

asked 18/11/2024
Idan Bar-On
37 questions

Question 2

Report Export Collapse

How should gaps identified between the current and target profiles be addressed?

Comparing to and acting on the desired Tier level

Comparing to and acting on the desired Tier level

With a full project engagement to close all gaps

With a full project engagement to close all gaps

Through a risk based-approach

Through a risk based-approach

Suggested answer: C
Explanation:

According to the NIST Cybersecurity Framework, gaps identified between the current and target profiles should be addressed through a risk-based approach, which enables an organization to gauge the resources needed and prioritize the mitigation of gaps in a cost-effective manner. This approach also aligns the cybersecurity program with the business objectives and risk appetite of the organization12.

Reference Examples of Framework Profiles | NIST What is the NIST Cybersecurity Framework? | IBM

asked 18/11/2024
THARINDU AMARASINGHE
30 questions

Question 3

Report Export Collapse

Which COBIT implementation phase directs the development of an action plan based on the outcomes described in the Target Profile?

Phase 3 -Where Do We Want to Be?

Phase 3 -Where Do We Want to Be?

Phase 5 -How Do We Get There?

Phase 5 -How Do We Get There?

Phase 4 -What Needs to Be Done?

Phase 4 -What Needs to Be Done?

Suggested answer: B
Explanation:

The COBIT implementation phase that directs the development of an action plan based on the outcomes described in the Target Profile is Phase 5 - How Do We Get There? This phase involves defining the detailed steps, resources, roles, and responsibilities for executing the implementation plan and achieving the desired outcomes12.

Reference 7 Phases in COBIT Implementation | COBIT Certification - Simplilearn COBIT 2019 Design and Implementation COBIT Implementation, page 31.

asked 18/11/2024
Krishnan S Sridhar
32 questions

Question 4

Report Export Collapse

Which of the following is one of the objectives of CSF Step 6: Determine, Analyze and Prioritize Gaps?

Translate improvement opportunities into justifiable, contributing projects.

Translate improvement opportunities into justifiable, contributing projects.

Direct stakeholder engagement, communication, and reporting.

Direct stakeholder engagement, communication, and reporting.

Communicate the I&T strategy and direction.

Communicate the I&T strategy and direction.

Suggested answer: A
Explanation:

One of the objectives of CSF Step 6 is to translate improvement opportunities into justifiable, contributing projects, which means to develop an action plan that addresses the gaps between the current and target profiles, and that aligns with the organization's mission drivers, risk appetite, and resource constraints12.

Reference Getting Started with the NIST Cybersecurity Framework: A Quick Start Guide, page 8. NIST CSF: The seven-step cybersecurity framework process

asked 18/11/2024
Allen J Tyson
30 questions

Question 5

Report Export Collapse

Which of the following is a framework principle established by NIST as an initial framework consideration?

Avoiding business risks

Avoiding business risks

Impact on global operations

Impact on global operations

Ensuring regulatory compliance

Ensuring regulatory compliance

Suggested answer: C
Explanation:

One of the framework principles established by NIST is to ensure that the framework is consistent and aligned with existing regulatory and legal requirements that are relevant to cybersecurity12.

asked 18/11/2024
Sebastian Romero
45 questions

Question 6

Report Export Collapse

Which role will benefit MOST from a better understanding of the current cybersecurity posture by applying the CSF?

Executives

Executives

Acquisition specialists

Acquisition specialists

Legal experts

Legal experts

Suggested answer: A
Explanation:

Executives are the role that will benefit most from a better understanding of the current cybersecurity posture by applying the CSF. This is because executives are responsible for setting the strategic direction, objectives, and priorities for the organization, as well as overseeing the allocation of resources and the management of risks1. By applying the CSF, executives can gain a comprehensive and consistent view of the cybersecurity risks and capabilities of the organization, and align them with the business goals and requirements2. The CSF can also help executives communicate and collaborate with other stakeholders, such as regulators, customers, suppliers, and partners, on cybersecurity issues3.

asked 18/11/2024
Marcelo I Sotelo S
36 questions

Question 7

Report Export Collapse

When coordinating framework implementation, the business/process level collaborates with the implementation/operations level to:

develop the risk management framework.

develop the risk management framework.

assess changes in current and future risks.

assess changes in current and future risks.

create the framework profile.

create the framework profile.

Suggested answer: B
Explanation:

According to the TM Forum's Business Process Framework (eTOM), the business/process level is responsible for defining the business strategy, objectives, and requirements, as well as monitoring and controlling the performance and quality of the processes1. The implementation/operations level is responsible for designing, developing, and executing the processes that deliver and support the services1. When coordinating framework implementation, these two levels collaborate to assess changes in current and future risks, such as market trends, customer expectations, regulatory compliance, security threats, and operational issues2. This helps them to align the processes with the business goals and outcomes, and to identify and mitigate any potential gaps or challenges3.

asked 18/11/2024
An Khang Nguyen
48 questions

Question 8

Report Export Collapse

Which of the following COBIT 2019 governance principles corresponds to the CSF application stating that CSF profiles support flexibility in content and structure?

A governance system should be customized to the enterprise needs, using a set of design factors as parameters.

A governance system should be customized to the enterprise needs, using a set of design factors as parameters.

A governance system should focus primarily on the enterprise's IT function and information processing.

A governance system should focus primarily on the enterprise's IT function and information processing.

A governance system should clearly distinguish between governance and management activities and structures.

A governance system should clearly distinguish between governance and management activities and structures.

Suggested answer: A
Explanation:

This principle corresponds to the CSF application stating that CSF profiles support flexibility in content and structure, because both emphasize the need for tailoring the governance system to the specific context and requirements of the enterprise12. The CSF profiles are based on the enterprise's business drivers, risk appetite, and current and target cybersecurity posture3. The COBIT 2019 design factors are a set of parameters that influence the design and operation of the governance system, such as enterprise strategy, size, culture, and regulatory environment4.

asked 18/11/2024
Franco Santos
38 questions

Question 9

Report Export Collapse

Which of the following functions provides foundational activities for the effective use of the Cybersecurity Framework?

Protect

Protect

Identify

Identify

Detect

Detect

Suggested answer: B
Explanation:

The Identify function provides foundational activities for the effective use of the Cybersecurity Framework, because it assists in developing an organizational understanding of managing cybersecurity risk to systems, people, assets, data, and capabilities12. This understanding enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs12. The Identify function includes outcome categories such as Asset Management, Business Environment, Governance, Risk Assessment, Risk Management Strategy, and Supply Chain Risk Management12.

asked 18/11/2024
William Kerr
38 questions

Question 10

Report Export Collapse

What does a CSF Informative Reference within the CSF Core provide?

A high-level strategic view of the life cycle of an organization's management of cybersecurity risk

A high-level strategic view of the life cycle of an organization's management of cybersecurity risk

A group of cybersecurity outcomes tied to programmatic needs and particular activities

A group of cybersecurity outcomes tied to programmatic needs and particular activities

Specific sections of standards, guidelines, and practices that illustrate a method to achieve an associated outcome

Specific sections of standards, guidelines, and practices that illustrate a method to achieve an associated outcome

Suggested answer: C
Explanation:

A CSF Informative Reference within the CSF Core provides a citation to a related activity from another standard or guideline that can help an organization achieve the outcome described in a CSF Subcategory12. For example, the Informative Reference for ID.AM-1 (Physical devices and systems within the organization are inventoried) is COBIT 5 APO01.01, which states 'Maintain an inventory of IT assets'3.

asked 18/11/2024
Aleksey Koltsov
30 questions
Total 50 questions
Go to page: of 5