ExamGecko
Home Home / Isaca / NIST-COBIT-2019

Isaca NIST-COBIT-2019 Practice Test - Questions Answers

Question list
Search
Search

Which of the following is MOST important for successful execution of CSF implementation Step 6 - Determine, Analyze, and Prioritize Gaps?

A.

Have management review and approve the gap analysis.

A.

Have management review and approve the gap analysis.

Answers
B.

Engage external experts to perform a cost-benefit analysis.

B.

Engage external experts to perform a cost-benefit analysis.

Answers
C.

Engage business and IT process owners for internal expertise.

C.

Engage business and IT process owners for internal expertise.

Answers
Suggested answer: C

Explanation:

According to the ISACA guide, engaging business and IT process owners for internal expertise is most important for successful execution of CSF implementation Step 6, as they can provide valuable insights into the current and desired states of the processes, the gaps and potential solutions, and the costs and benefits of the implementation1. They can also help to align the cybersecurity program with the business objectives and risk appetite of the organization.

Reference Implementing the NIST Cybersecurity Framework Using COBIT 2019, page 17.

How should gaps identified between the current and target profiles be addressed?

A.

Comparing to and acting on the desired Tier level

A.

Comparing to and acting on the desired Tier level

Answers
B.

With a full project engagement to close all gaps

B.

With a full project engagement to close all gaps

Answers
C.

Through a risk based-approach

C.

Through a risk based-approach

Answers
Suggested answer: C

Explanation:

According to the NIST Cybersecurity Framework, gaps identified between the current and target profiles should be addressed through a risk-based approach, which enables an organization to gauge the resources needed and prioritize the mitigation of gaps in a cost-effective manner. This approach also aligns the cybersecurity program with the business objectives and risk appetite of the organization12.

Reference Examples of Framework Profiles | NIST What is the NIST Cybersecurity Framework? | IBM

Which COBIT implementation phase directs the development of an action plan based on the outcomes described in the Target Profile?

A.

Phase 3 -Where Do We Want to Be?

A.

Phase 3 -Where Do We Want to Be?

Answers
B.

Phase 5 -How Do We Get There?

B.

Phase 5 -How Do We Get There?

Answers
C.

Phase 4 -What Needs to Be Done?

C.

Phase 4 -What Needs to Be Done?

Answers
Suggested answer: B

Explanation:

The COBIT implementation phase that directs the development of an action plan based on the outcomes described in the Target Profile is Phase 5 - How Do We Get There? This phase involves defining the detailed steps, resources, roles, and responsibilities for executing the implementation plan and achieving the desired outcomes12.

Reference 7 Phases in COBIT Implementation | COBIT Certification - Simplilearn COBIT 2019 Design and Implementation COBIT Implementation, page 31.

Which of the following is one of the objectives of CSF Step 6: Determine, Analyze and Prioritize Gaps?

A.

Translate improvement opportunities into justifiable, contributing projects.

A.

Translate improvement opportunities into justifiable, contributing projects.

Answers
B.

Direct stakeholder engagement, communication, and reporting.

B.

Direct stakeholder engagement, communication, and reporting.

Answers
C.

Communicate the I&T strategy and direction.

C.

Communicate the I&T strategy and direction.

Answers
Suggested answer: A

Explanation:

One of the objectives of CSF Step 6 is to translate improvement opportunities into justifiable, contributing projects, which means to develop an action plan that addresses the gaps between the current and target profiles, and that aligns with the organization's mission drivers, risk appetite, and resource constraints12.

Reference Getting Started with the NIST Cybersecurity Framework: A Quick Start Guide, page 8. NIST CSF: The seven-step cybersecurity framework process

Which of the following is a framework principle established by NIST as an initial framework consideration?

A.

Avoiding business risks

A.

Avoiding business risks

Answers
B.

Impact on global operations

B.

Impact on global operations

Answers
C.

Ensuring regulatory compliance

C.

Ensuring regulatory compliance

Answers
Suggested answer: C

Explanation:

One of the framework principles established by NIST is to ensure that the framework is consistent and aligned with existing regulatory and legal requirements that are relevant to cybersecurity12.

Which role will benefit MOST from a better understanding of the current cybersecurity posture by applying the CSF?

A.

Executives

A.

Executives

Answers
B.

Acquisition specialists

B.

Acquisition specialists

Answers
C.

Legal experts

C.

Legal experts

Answers
Suggested answer: A

Explanation:

Executives are the role that will benefit most from a better understanding of the current cybersecurity posture by applying the CSF. This is because executives are responsible for setting the strategic direction, objectives, and priorities for the organization, as well as overseeing the allocation of resources and the management of risks1. By applying the CSF, executives can gain a comprehensive and consistent view of the cybersecurity risks and capabilities of the organization, and align them with the business goals and requirements2. The CSF can also help executives communicate and collaborate with other stakeholders, such as regulators, customers, suppliers, and partners, on cybersecurity issues3.

When coordinating framework implementation, the business/process level collaborates with the implementation/operations level to:

A.

develop the risk management framework.

A.

develop the risk management framework.

Answers
B.

assess changes in current and future risks.

B.

assess changes in current and future risks.

Answers
C.

create the framework profile.

C.

create the framework profile.

Answers
Suggested answer: B

Explanation:

According to the TM Forum's Business Process Framework (eTOM), the business/process level is responsible for defining the business strategy, objectives, and requirements, as well as monitoring and controlling the performance and quality of the processes1. The implementation/operations level is responsible for designing, developing, and executing the processes that deliver and support the services1. When coordinating framework implementation, these two levels collaborate to assess changes in current and future risks, such as market trends, customer expectations, regulatory compliance, security threats, and operational issues2. This helps them to align the processes with the business goals and outcomes, and to identify and mitigate any potential gaps or challenges3.

Which of the following COBIT 2019 governance principles corresponds to the CSF application stating that CSF profiles support flexibility in content and structure?

A.

A governance system should be customized to the enterprise needs, using a set of design factors as parameters.

A.

A governance system should be customized to the enterprise needs, using a set of design factors as parameters.

Answers
B.

A governance system should focus primarily on the enterprise's IT function and information processing.

B.

A governance system should focus primarily on the enterprise's IT function and information processing.

Answers
C.

A governance system should clearly distinguish between governance and management activities and structures.

C.

A governance system should clearly distinguish between governance and management activities and structures.

Answers
Suggested answer: A

Explanation:

This principle corresponds to the CSF application stating that CSF profiles support flexibility in content and structure, because both emphasize the need for tailoring the governance system to the specific context and requirements of the enterprise12. The CSF profiles are based on the enterprise's business drivers, risk appetite, and current and target cybersecurity posture3. The COBIT 2019 design factors are a set of parameters that influence the design and operation of the governance system, such as enterprise strategy, size, culture, and regulatory environment4.

Which of the following functions provides foundational activities for the effective use of the Cybersecurity Framework?

A.

Protect

A.

Protect

Answers
B.

Identify

B.

Identify

Answers
C.

Detect

C.

Detect

Answers
Suggested answer: B

Explanation:

The Identify function provides foundational activities for the effective use of the Cybersecurity Framework, because it assists in developing an organizational understanding of managing cybersecurity risk to systems, people, assets, data, and capabilities12. This understanding enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs12. The Identify function includes outcome categories such as Asset Management, Business Environment, Governance, Risk Assessment, Risk Management Strategy, and Supply Chain Risk Management12.

What does a CSF Informative Reference within the CSF Core provide?

A.

A high-level strategic view of the life cycle of an organization's management of cybersecurity risk

A.

A high-level strategic view of the life cycle of an organization's management of cybersecurity risk

Answers
B.

A group of cybersecurity outcomes tied to programmatic needs and particular activities

B.

A group of cybersecurity outcomes tied to programmatic needs and particular activities

Answers
C.

Specific sections of standards, guidelines, and practices that illustrate a method to achieve an associated outcome

C.

Specific sections of standards, guidelines, and practices that illustrate a method to achieve an associated outcome

Answers
Suggested answer: C

Explanation:

A CSF Informative Reference within the CSF Core provides a citation to a related activity from another standard or guideline that can help an organization achieve the outcome described in a CSF Subcategory12. For example, the Informative Reference for ID.AM-1 (Physical devices and systems within the organization are inventoried) is COBIT 5 APO01.01, which states 'Maintain an inventory of IT assets'3.

Total 50 questions
Go to page: of 5