ExamGecko
Home Home / Isaca / NIST-COBIT-2019

Isaca NIST-COBIT-2019 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

The activity of determining an appropriate target capability level for each process occurs within which implementation phase?

A.

Phase 4 - What Needs to Be Done?

A.

Phase 4 - What Needs to Be Done?

Answers
B.

Phase 3 - Where Do We Want to Be?

B.

Phase 3 - Where Do We Want to Be?

Answers
C.

Phase 2 - Where Are We Now?

C.

Phase 2 - Where Are We Now?

Answers
Suggested answer: B

Explanation:

The activity of determining an appropriate target capability level for each process occurs within Implementation Phase 3, as it helps to set an improvement target and identify gaps and potential solutions using COBIT's guidance. This involves creating a detailed business case and a high-level program plan for the implementation12.

Reference Defining Target Capability Levels in COBIT 2019: A Proposal for Refinement COBIT 2019 Design and Implementation COBIT Implementation, page 31.

Which of the following should an organization review to gain a better understanding of the likelihood and impact of cybersecurity events?

A.

Relevant internal or external capability benchmarks

A.

Relevant internal or external capability benchmarks

Answers
B.

Cybersecurity frameworks, standards, and guidelines

B.

Cybersecurity frameworks, standards, and guidelines

Answers
C.

Cyber threat information from internal and external sources

C.

Cyber threat information from internal and external sources

Answers
Suggested answer: C

Explanation:

According to the NIST Cybersecurity Framework, an organization should review cyber threat information from internal and external sources to gain a better understanding of the likelihood and impact of cybersecurity events. This information can help the organization to identify potential threats, vulnerabilities, and consequences, and to assess the current and target profiles of its cybersecurity posture12.

Reference Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management, page 19. COBIT VS NIST : A Comprehensive Analysis - ITSM Docs

Which of the following is an important consideration when defining the roadmap in COBIT Implementation Phase 3 - Where Do We Want to Be?

A.

Agreed metrics for measuring outcomes

A.

Agreed metrics for measuring outcomes

Answers
B.

Reporting procedures and requirements

B.

Reporting procedures and requirements

Answers
C.

Change-enablement implications

C.

Change-enablement implications

Answers
Suggested answer: C

Explanation:

An important consideration when defining the roadmap in COBIT Implementation Phase 3 is the change-enablement implications, which refer to the potential impact of the proposed solutions on the people, culture, and behavior of the organization. This involves assessing the readiness and willingness of the stakeholders to adopt the changes, identifying the risks and barriers to change, and developing strategies to address them12.

Reference 7 Phases in COBIT Implementation | COBIT Certification - Simplilearn COBIT 2019 Design and Implementation COBIT Implementation, page 31.

Which of the following is CRITICAL for the success of CSF Step 6: Determine, Analyze and Prioritize Gaps?

A.

Identification of threats and vulnerabilities related to key assets

A.

Identification of threats and vulnerabilities related to key assets

Answers
B.

Experience in behavioral and change management

B.

Experience in behavioral and change management

Answers
C.

Clear understanding of the likelihood and impact of cybersecurity events

C.

Clear understanding of the likelihood and impact of cybersecurity events

Answers
Suggested answer: C

Explanation:

A clear understanding of the likelihood and impact of cybersecurity events is critical for the success of CSF Step 6, as it helps to prioritize the gaps and actions based on the risk assessment and the cost-benefit analysis of the proposed solutions12.

Reference 7 Steps to Implement & Improve Cybersecurity with NIST NIST CSF: The seven-step cybersecurity framework process

Which of the following is MOST likely to cause an organization's NIST Cybersecurity Framework (CSF) implementation to fail?

A.

Organizational training on the CSF is not provided.

A.

Organizational training on the CSF is not provided.

Answers
B.

Potential benefits of proposed improvements are not considered.

B.

Potential benefits of proposed improvements are not considered.

Answers
C.

The implementation timeline is too long.

C.

The implementation timeline is too long.

Answers
Suggested answer: B

Explanation:

One of the most likely causes of an organization's NIST CSF implementation failure is that the potential benefits of proposed improvements are not considered, which means that the organization does not conduct a cost-benefit analysis of the solutions to address the gaps between the current and target profiles. This can result in a lack of justification, prioritization, and alignment of the implementation plan with the organization's mission drivers, risk appetite, and resource constraints12.

Reference 7 Steps to Implement & Improve Cybersecurity with NIST 3 Security Issues Overlooked By the NIST Framework

Which function of the CSF is addressed by incorporating governance, risk, and compliance (GRC) elements into the implementation plan?

A.

Protect

A.

Protect

Answers
B.

Detect

B.

Detect

Answers
C.

Identify

C.

Identify

Answers
Suggested answer: C

Explanation:

The function of the CSF that is addressed by incorporating governance, risk, and compliance (GRC) elements into the implementation plan is Identify, which assists in developing an organizational understanding to managing cybersecurity risk to systems, people, assets, data, and capabilities. GRC elements help to define the governance program, the legal and regulatory requirements, the risk management strategy, and the supply chain risk management strategy of the organization12.

Reference The Five Functions | NIST NIST Cybersecurity Framework 2.0: Understanding the 'Govern' Function

Which of the following is the MOST beneficial result of an effective CSF implementation plan?

A.

Cybersecurity risk management practices are formalized and institutionalized.

A.

Cybersecurity risk management practices are formalized and institutionalized.

Answers
B.

Key stakeholders understand the quick wins of the cybersecurity program.

B.

Key stakeholders understand the quick wins of the cybersecurity program.

Answers
C.

Key stakeholders understand the cybersecurity requirements of the chosen vendors.

C.

Key stakeholders understand the cybersecurity requirements of the chosen vendors.

Answers
Suggested answer: A

Explanation:

The most beneficial result of an effective CSF implementation plan is that cybersecurity risk management practices are formalized and institutionalized, which means that the organization has established and maintained a consistent and comprehensive approach to managing cybersecurity risks across its systems, processes, and people. This result can help the organization to reduce the likelihood and impact of cybersecurity events, improve its resilience and compliance, and enhance its reputation and trust12.

Reference Public Draft: The NIST Cybersecurity Framework 2, page 1. Cybersecurity Framework | NIST

When aligning to the NIST Cybersecurity Framework, what should occur after tier levels and framework core outcomes are determined?

A.

Report discovered issues to senior management.

A.

Report discovered issues to senior management.

Answers
B.

Assign mitigating control development.

B.

Assign mitigating control development.

Answers
C.

Compare current and target profiles.

C.

Compare current and target profiles.

Answers
Suggested answer: C

Explanation:

According to the NIST Cybersecurity Framework, after determining the tier levels and framework core outcomes, the next step is to compare the current and target profiles, which describe the organization's current and desired cybersecurity posture based on the framework core functions, categories, and subcategories1. This comparison helps to identify the gaps and prioritize the actions for improvement2.

Reference Cybersecurity Framework Components | NIST What is the NIST Cybersecurity Framework? | IBM

An organization is concerned that there will be resistance in attempts to close gaps between the current and target profiles. Which of the following is the

BEST approach to gain support for the process?

A.

Implement organization-wide training on the CSF.

A.

Implement organization-wide training on the CSF.

Answers
B.

Communicate management opinions regarding the project.

B.

Communicate management opinions regarding the project.

Answers
C.

Identify quick wins for implementation first.

C.

Identify quick wins for implementation first.

Answers
Suggested answer: C

Explanation:

Identifying quick wins for implementation first is the best approach to gain support for the process, as it can demonstrate the value and feasibility of the project, and motivate the stakeholders to overcome the resistance and embrace the change12. Quick wins are those actions that can be implemented rapidly and easily, and that can produce visible and measurable results3.

Reference 7 Phases in COBIT Implementation | COBIT Certification - Simplilearn Implementing the NIST Cybersecurity Framework Using COBIT 2019, page 17. What is a Quick Win? - Definition from Techopedia

Which of the following should be a PRIMARY consideration when creating an action plan to address gaps identified in CSF Step 6: Determine, Analyze, and Prioritize Gaps?

A.

Mission drivers

A.

Mission drivers

Answers
B.

Stakeholder map

B.

Stakeholder map

Answers
C.

IT process descriptions

C.

IT process descriptions

Answers
Suggested answer: A

Explanation:

According to the NIST Cybersecurity Framework, mission drivers are a primary consideration when creating an action plan to address gaps identified in CSF Step 6, as they help to align the cybersecurity program with the organization's objectives, priorities, and risk appetite. Mission drivers also help to determine the resources needed and the cost-benefit analysis of the proposed solutions12.

Reference 7 Steps to Implement & Improve Cybersecurity with NIST Cybersecurity Framework v1.1 - CSF Tools - Identity Digital, page 7.

Total 50 questions
Go to page: of 5