ExamGecko
Home Home / Isaca / NIST-COBIT-2019

Isaca NIST-COBIT-2019 Practice Test - Questions Answers, Page 3

Question list
Search
Search

Which of the following is an input to COBIT Implementation Phase 1: What Are the Drivers?

A.

Risk response document

A.

Risk response document

Answers
B.

Current capability rating for selected processes

B.

Current capability rating for selected processes

Answers
C.

Program wake-up call

C.

Program wake-up call

Answers
Suggested answer: C

Explanation:

A program wake-up call is an input to COBIT Implementation Phase 1: What Are the Drivers, because it is a trigger event that creates a sense of urgency and a need for change in the organization's governance and management of enterprise I&T12. A program wake-up call can be internal or external, positive or negative, such as a major incident, a new regulation, a strategic initiative, or a stakeholder feedback34.

Which information should be collected for a Current Profile?

A.

Implementation Status

A.

Implementation Status

Answers
B.

Recommended Actions

B.

Recommended Actions

Answers
C.

Resource Required

C.

Resource Required

Answers
Suggested answer: A

Explanation:

The implementation status is the information that should be collected for a Current Profile, because it indicates the degree to which the cybersecurity outcomes defined by the CSF Subcategories are currently being achieved by the organization12. The implementation status can be expressed using a four-level scale: Not Performed, Partially Performed, Performed, and Informative Reference Not Applicable34.

During Step 3: Create a Current Profile, an enterprise outcome has reached a 95% subcategory maturity level. How would this level of achievement be described in the COBIT Performance Management Rating Scale?

A.

Largely Achieved

A.

Largely Achieved

Answers
B.

Partially Achieved

B.

Partially Achieved

Answers
C.

Fully Achieved

C.

Fully Achieved

Answers
Suggested answer: C

Explanation:

According to the COBIT Performance Management Rating Scale, a subcategory maturity level of 95% corresponds to the rating of Fully Achieved, which means that the outcome is achieved above 85%12. This indicates that the enterprise has a high degree of capability and maturity in the subcategory, and that the practices and activities are performed consistently and effectively34.

During CSF implementation, when is an information security manager MOST likely to identify key enterprise and supporting alignment goals as previously understood?

A.

CSF Steps 5: Create a Target Profile and 6: Determine, Analyze, and Prioritize Gaps

A.

CSF Steps 5: Create a Target Profile and 6: Determine, Analyze, and Prioritize Gaps

Answers
B.

CSF Step 1: Prioritize and Scope

B.

CSF Step 1: Prioritize and Scope

Answers
C.

CSF Steps 2: Orient and 3: Create a Current Profile

C.

CSF Steps 2: Orient and 3: Create a Current Profile

Answers
Suggested answer: B

Explanation:

This CSF step corresponds to the COBIT objective of knowledge and understanding of enterprise goals, because it involves identifying the business drivers, mission, objectives, and risk appetite of the organization, as well as the scope and boundaries of the cybersecurity program12. This step helps to ensure that the cybersecurity activities and outcomes are aligned with the enterprise goals and strategy34.

During the implementation of Step 2: Orient and Step 3: Create a Current Profile, the organization's asset register should primarily align to:

A.

organizational strategy.

A.

organizational strategy.

Answers
B.

configuration management.

B.

configuration management.

Answers
C.

the security business case.

C.

the security business case.

Answers
Suggested answer: B

Explanation:

The organization's asset register should primarily align to configuration management, because it is a process that maintains an accurate and complete inventory of the organization's I&T assets and their relationships12. Configuration management supports the implementation of Step 2: Orient and Step 3: Create a Current Profile, because it helps to identify the systems, people, assets, data, and capabilities that are within the scope of the cybersecurity program, and to assess their current cybersecurity outcomes34.

In which CSF step should an enterprise document its existing category and subcategory outcome achievements?

A.

Step 1: Prioritize and Scope

A.

Step 1: Prioritize and Scope

Answers
B.

Step 3: Create a Current Profile

B.

Step 3: Create a Current Profile

Answers
C.

Step 4: Conduct a Risk Assessment

C.

Step 4: Conduct a Risk Assessment

Answers
Suggested answer: B

Explanation:

This CSF step involves documenting the existing category and subcategory outcome achievements, by using the implementation status to indicate the degree to which the cybersecurity outcomes defined by the CSF Subcategories are currently being achieved by the organization12. The Current Profile reflects the current cybersecurity posture of the organization, and helps to identify the gaps and opportunities for improvement3 .

Which of the following represents a best practice for completing CSF Step 3: Create a Current Profile?

A.

Procuring solutions that are cost-effective and fit the organization's technical architecture

A.

Procuring solutions that are cost-effective and fit the organization's technical architecture

Answers
B.

Assessing current availability, performance, and capacity to create a baseline

B.

Assessing current availability, performance, and capacity to create a baseline

Answers
C.

Engaging in a dialogue and obtaining input to determine appropriate goals, tiers, and Activities

C.

Engaging in a dialogue and obtaining input to determine appropriate goals, tiers, and Activities

Answers
Suggested answer: C

Explanation:

This represents a best practice for completing CSF Step 3: Create a Current Profile, because it involves collaborating with relevant stakeholders to identify the current cybersecurity outcomes and implementation status of the organization12. Engaging in a dialogue and obtaining input can help to ensure that the Current Profile reflects the business drivers, mission, objectives, and risk appetite of the organization, as well as the scope and boundaries of the cybersecurity program34.

Identifying external compliance requirements is MOST likely to occur during which of the following COBIT implementation phases?

A.

Phase 4 - What Needs to Be Done?

A.

Phase 4 - What Needs to Be Done?

Answers
B.

Phase 2 - Where Are We Now?

B.

Phase 2 - Where Are We Now?

Answers
C.

Phase 3 - Where Do We Want to Be?

C.

Phase 3 - Where Do We Want to Be?

Answers
Suggested answer: B

Explanation:

Identifying external compliance requirements is most likely to occur during COBIT Implementation Phase 2: Where Are We Now?, because this phase involves assessing the current state of the enterprise's governance and management system, as well as its strengths, weaknesses, opportunities, and threats12. This phase also includes identifying the relevant stakeholders, drivers, and scope of the implementation program . Therefore, this phase requires a thorough understanding of the external laws, regulations, and contractual obligations that apply to the enterprise and its I&T activities.

Which of the following is a PRIMARY input into Steps 2 and 3: Orient and Create a Current Profile?

A.

Evaluating business cases

A.

Evaluating business cases

Answers
B.

Updating business cases

B.

Updating business cases

Answers
C.

Defining business cases

C.

Defining business cases

Answers
Suggested answer: C

Explanation:

Defining business cases is a primary input into Steps 2 and 3: Orient and Create a Current Profile, because it involves identifying the business drivers, mission, objectives, and risk appetite of the organization, as well as the scope and boundaries of the cybersecurity program12. A business case is a document that provides the rationale and justification for initiating a cybersecurity project or program, and describes the expected benefits, costs, risks, and alternatives34.

Which of the following is a KEY activity of COBIT Implementation Phase 2: Where Are We Now?

A.

Identification of applicable compliance requirements

A.

Identification of applicable compliance requirements

Answers
B.

Identification of challenges and success factors

B.

Identification of challenges and success factors

Answers
C.

Identification and definition of improvement targets

C.

Identification and definition of improvement targets

Answers
Suggested answer: A

Explanation:

This is a key activity of COBIT Implementation Phase 2: Where Are We Now?, because it involves assessing the current state of the enterprise's governance and management system, as well as its strengths, weaknesses, opportunities, and threats12. This activity also includes identifying the relevant stakeholders, drivers, and scope of the implementation program. Therefore, this activity requires a thorough understanding of the external laws, regulations, and contractual obligations that apply to the enterprise and its I&T activities34.

Total 50 questions
Go to page: of 5