Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

DES-9131 Sample Questions Answers

Questions 4

What are the four tiers of integration within the NIST Cybersecurity Framework?

Options:

A.

Selective, Repeatable, Partial, and Adaptive

B.

Partial, Risk Informed, Repeatable, and Adaptive

C.

Corrective, Risk Informed, Repeatable. and Adaptive

D.

Risk Informed, Selective, Repeatable, and Partial

Buy Now
Questions 5

Your organization was breached. You informed the CSIRT and they contained the breach and eradicated the threat.

What is the next step required to ensure that you have an effective CSRL and a more robust cybersecurity posture in the future?

Options:

A.

Determine change agent

B.

Update the BIA

C.

Conduct a gap analysis

D.

Update the BCP

Buy Now
Questions 6

What is a consideration when performing data collection in Information Security Continuous Monitoring?

Options:

A.

Data collection efficiency is increased through automation.

B.

The more data collected, the better chances to catch an anomaly.

C.

Collection is used only for compliance requirements.

D.

Data is best captured as it traverses the network.

Buy Now
Questions 7

A company suffers a data breach and determines that the threat actors stole or compromised 10,000 user

profiles. The company had planned for such a breach and determined the loss would be around $2 million.

Soon after restoration, the company stock suffered a 30% drop and the loss was nearly $20 million. In addition, the company received negative press.

Which area of risk did the business forget to account for?

Options:

A.

Litigation or Legal Risk

B.

Reputational Risk

C.

Vulnerability risk

D.

Business Operational Risk

Buy Now
Questions 8

Which NIST Cybersecurity Framework category ensures that organizational communication and data flows are mapped?

Options:

A.

ID.AM

B.

ID.GV

C.

ID.RA

D.

ID.SC

Buy Now
Questions 9

What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and

recover from malicious computer incidents such as a denial-of-service attack?

Options:

A.

Disaster Recovery Plan

B.

Emergency Analysis Plan

C.

Crisis Communication Plan

D.

Incident Response Plan

Buy Now
Questions 10

During what activity does an organization identify and prioritize technical, organizational, procedural,

administrative, and physical security weaknesses?

Options:

A.

Table top exercise

B.

Penetration testing

C.

Vulnerability assessment

D.

White box testing

Buy Now
Questions 11

What determines the technical controls used to restrict access to USB devices and help prevent their use

within a company?

Options:

A.

Block use of the USB devices for all employees

B.

Written security policy prohibiting the use of the USB devices

C.

Acceptable use policy in the employee HR on-boarding training

D.

Detect use of the USB devices and report users

Buy Now
Questions 12

Match the security event to its description.

Options:

Buy Now
Questions 13

What should an organization use to effectively mitigate against password sharing to prevent unauthorized

access to systems?

Options:

A.

Access through a ticketing system

B.

Frequent password resets

C.

Strong password requirements

D.

Two factor authentication

Buy Now
Questions 14

What contains a predefined set of instructions or processes that describes the management policy,

procedures, and written plan defining recovery of information systems?

Options:

A.

RAS

B.

DRP

C.

BIA

D.

BCP

Buy Now
Questions 15

A company implemented an intrusion detection system. They notice the system generates a very large number of false alarms.

What steps should the company take to rectify this situation?

Options:

A.

Re-evaluate the Baseline and make necessary adjustments to the detection rules

B.

Replace the intrusion detection system with an intrusion protection system

C.

Define how to identify and disregard the false alarms

D.

Consider evaluating a system from another vendor

Buy Now
Questions 16

Which category addresses the detection of unauthorized code in software?

Options:

A.

PR.DS

B.

DE.DP

C.

PR.AT

D.

DE.CM

Buy Now
Questions 17

What database is used to record and manage assets?

Options:

A.

Configuration Management Database

B.

Asset Inventory Management Database

C.

High Availability Mirrored Database

D.

Patch Management Inventory Database

Buy Now
Questions 18

What supports an organization in making risk management decisions to address their security posture in real time?

Options:

A.

Baseline reporting

B.

Continuous monitoring

C.

User access reviews

D.

Video surveillance

Buy Now
Exam Code: DES-9131
Exam Name: Specialist - Infrastructure Security Exam
Last Update: Nov 21, 2024
Questions: 60
$64  $159.99
$48  $119.99
$40  $99.99
buy now DES-9131