ExamGecko
Home Home / Isaca / NIST-COBIT-2019

Isaca NIST-COBIT-2019 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Analysis is one of the categories within which of the following Core Functions?

A.

Detect

A.

Detect

Answers
B.

Respond

B.

Respond

Answers
C.

Recover

C.

Recover

Answers
Suggested answer: A

Explanation:

Analysis is one of the six categories within the Detect function of the NIST Cybersecurity Framework. The Analysis category aims to identify the occurrence of a cybersecurity event by performing data aggregation, correlation, and analysis12.

Which of the following is associated with the 'Detect' core function of the NIST Cybersecurity Framework?

A.

Information Protection Processes and Procedures

A.

Information Protection Processes and Procedures

Answers
B.

Anomalies and Events

B.

Anomalies and Events

Answers
C.

Risk Assessment

C.

Risk Assessment

Answers
Suggested answer: B

Explanation:

Anomalies and Events is one of the six categories within the Detect function of the NIST Cybersecurity Framework. The Anomalies and Events category aims to ensure that anomalous activity is detected in a timely manner and the potential impact of events is understood12.

Within the CSF Core structure, which type of capability can be implemented to help practitioners recognize potential or realized risk to enterprise assets?

A.

Protection capability

A.

Protection capability

Answers
B.

Response capability

B.

Response capability

Answers
C.

Detection capability

C.

Detection capability

Answers
Suggested answer: C

Explanation:

The Detection capability is the type of capability within the CSF Core structure that can help practitioners recognize potential or realized risk to enterprise assets. The Detection capability consists of six categories that enable timely discovery of cybersecurity events, such as Anomalies and Events, Security Continuous Monitoring, and Detection Processes12.

The CSF Implementation Tiers distinguish three fundamental dimensions of risk management to help enterprises evaluate which of the following?

A.

Cybersecurity posture

A.

Cybersecurity posture

Answers
B.

Cybersecurity threats

B.

Cybersecurity threats

Answers
C.

Cybersecurity landscape

C.

Cybersecurity landscape

Answers
Suggested answer: A

Explanation:

The CSF Implementation Tiers distinguish three fundamental dimensions of risk management to help enterprises evaluate their cybersecurity posture, which is the alignment of their cybersecurity activities and outcomes with their business objectives and risk appetite12. The Tiers range from Partial (Tier 1) to Adaptive (Tier 4) and describe the degree of rigor, integration, and collaboration of the organization's cybersecurity risk management practices12.

What is the MOST important reason to compare framework profiles?

A.

To improve security posture

A.

To improve security posture

Answers
B.

To conduct a risk assessment

B.

To conduct a risk assessment

Answers
C.

To identify gaps

C.

To identify gaps

Answers
Suggested answer: C

Explanation:

The most important reason to compare framework profiles is to identify gaps between the current and target state of cybersecurity activities and outcomes, and to prioritize the actions needed to address them12. Framework profiles are the alignment of the functions, categories, and subcategories of the NIST Cybersecurity Framework with the business requirements, risk tolerance, and resources of the organization3. By comparing the current profile (what is being achieved) and the target profile (what is needed), an organization can assess its cybersecurity posture and develop a roadmap for improvement4.

The goals cascade supports prioritization of management objectives based on:

A.

the prioritization of enterprise goals.

A.

the prioritization of enterprise goals.

Answers
B.

the prioritization of business objectives.

B.

the prioritization of business objectives.

Answers
C.

the prioritization of stakeholder needs.

C.

the prioritization of stakeholder needs.

Answers
Suggested answer: C

Explanation:

The goals cascade is a mechanism that translates the stakeholder needs into specific, actionable, and customized goals at different levels of the enterprise12. The stakeholder needs are the drivers of the governance system and reflect the expectations and requirements of the internal and external parties that have an interest or influence on the enterprise34. The goals cascade supports the prioritization of management objectives based on the stakeholder needs, as well as the alignment of the enterprise goals, the alignment goals, and the governance and management objectives12.

The seven high-level CSF steps generally align to which of the following in COBIT 2019?

A.

High-level phases

A.

High-level phases

Answers
B.

High-level functions

B.

High-level functions

Answers
C.

High-level categories

C.

High-level categories

Answers
Suggested answer: A

Explanation:

The seven high-level CSF steps generally align to the high-level phases of the COBIT 2019 implementation guide, which are: What are the drivers?; Where are we now?; Where do we want to be?; What needs to be done?; How do we get there?; Did we get there?; and How do we keep the momentum going?12. These phases provide a structured approach for implementing a governance system using COBIT 2019, and can be mapped to the CSF steps of Prioritize and Scope, Orient, Create a Current Profile, Conduct a Risk Assessment, Create a Target Profile, Determine, Analyze and Prioritize Gaps, and Implement Action Plan34.

Which of the following is the MOST important input for prioritizing resources during program initiation?

A.

Replacement cost

A.

Replacement cost

Answers
B.

Risk register

B.

Risk register

Answers
C.

Business impact assessment

C.

Business impact assessment

Answers
Suggested answer: C

Explanation:

A business impact assessment (BIA) is the most important input for prioritizing resources during program initiation, because it helps to identify and evaluate the potential effects of disruptions to critical business functions and processes12. A BIA can help to determine the recovery objectives, priorities, and strategies for the program, as well as the resource requirements and dependencies34.

Which CSF step corresponds to the COBIT objective of knowledge and understanding of enterprise goals?

A.

Step 1: Prioritize and Scope

A.

Step 1: Prioritize and Scope

Answers
B.

Step 6: Determine, Analyze, and Prioritize Gaps

B.

Step 6: Determine, Analyze, and Prioritize Gaps

Answers
C.

Step 4: Conduct a Risk Assessment

C.

Step 4: Conduct a Risk Assessment

Answers
Suggested answer: A

Explanation:

This CSF step corresponds to the COBIT objective of knowledge and understanding of enterprise goals, because it involves identifying the business drivers, mission, objectives, and risk appetite of the organization, as well as the scope and boundaries of the cybersecurity program12. This step helps to ensure that the cybersecurity activities and outcomes are aligned with the enterprise goals and strategy34.

Which of the following COBIT tasks and activities corresponds to CSF Step 1: Prioritize and Scope?

A.

Understand the enterprise's capacity and capability for change.

A.

Understand the enterprise's capacity and capability for change.

Answers
B.

Use change agents to communicate informally and formally.

B.

Use change agents to communicate informally and formally.

Answers
C.

Determine ability to implement the change.

C.

Determine ability to implement the change.

Answers
Suggested answer: A

Explanation:

This COBIT task and activity corresponds to CSF Step 1: Prioritize and Scope, because it involves assessing the current state of the enterprise's governance and management system, as well as its readiness and ability to adopt changes12. This task and activity is part of the COBIT 2019 implementation phase 'Where are we now?'3, which aligns with the CSF step of identifying the business drivers, mission, objectives, and risk appetite of the organization4.

Total 50 questions
Go to page: of 5