Isaca NIST-COBIT-2019 Practice Test - Questions Answers
List of questions
Related questions
Which of the following is MOST important for successful execution of CSF implementation Step 6 - Determine, Analyze, and Prioritize Gaps?
Have management review and approve the gap analysis.
Engage external experts to perform a cost-benefit analysis.
Engage business and IT process owners for internal expertise.
How should gaps identified between the current and target profiles be addressed?
Comparing to and acting on the desired Tier level
With a full project engagement to close all gaps
Through a risk based-approach
Which COBIT implementation phase directs the development of an action plan based on the outcomes described in the Target Profile?
Phase 3 -Where Do We Want to Be?
Phase 5 -How Do We Get There?
Phase 4 -What Needs to Be Done?
Which of the following is one of the objectives of CSF Step 6: Determine, Analyze and Prioritize Gaps?
Translate improvement opportunities into justifiable, contributing projects.
Direct stakeholder engagement, communication, and reporting.
Communicate the I&T strategy and direction.
Which of the following is a framework principle established by NIST as an initial framework consideration?
Avoiding business risks
Impact on global operations
Ensuring regulatory compliance
Which role will benefit MOST from a better understanding of the current cybersecurity posture by applying the CSF?
Executives
Acquisition specialists
Legal experts
When coordinating framework implementation, the business/process level collaborates with the implementation/operations level to:
develop the risk management framework.
assess changes in current and future risks.
create the framework profile.
Which of the following COBIT 2019 governance principles corresponds to the CSF application stating that CSF profiles support flexibility in content and structure?
A governance system should be customized to the enterprise needs, using a set of design factors as parameters.
A governance system should focus primarily on the enterprise's IT function and information processing.
A governance system should clearly distinguish between governance and management activities and structures.
Which of the following functions provides foundational activities for the effective use of the Cybersecurity Framework?
Protect
Identify
Detect
What does a CSF Informative Reference within the CSF Core provide?
A high-level strategic view of the life cycle of an organization's management of cybersecurity risk
A group of cybersecurity outcomes tied to programmatic needs and particular activities
Specific sections of standards, guidelines, and practices that illustrate a method to achieve an associated outcome
Question