Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free EMC DES-9131 Practice Exam with Questions & Answers

Questions 1

What are the four tiers of integration within the NIST Cybersecurity Framework?

Options:
A.

Selective, Repeatable, Partial, and Adaptive

B.

Partial, Risk Informed, Repeatable, and Adaptive

C.

Corrective, Risk Informed, Repeatable. and Adaptive

D.

Risk Informed, Selective, Repeatable, and Partial

EMC DES-9131 Premium Access
Questions 2

You need to review your current security baseline policy for your company and determine which security

controls need to be applied to the baseline and what changes have occurred since the last update.

Which category addresses this need?

Options:
A.

ID.AM

B.

PR.IP

C.

PR.MA

D.

ID.SC

Questions 3

What is considered outside the scope of a BIA?

Options:
A.

Estimated probability of the identified threats actually occurring

B.

Selection of full, incremental, or differential backups

C.

Efficiency and effectiveness of existing risk mitigation controls

D.

Determination of capacity requirements for backups

Questions 4

What supports an organization in making risk management decisions to address their security posture in real time?

Options:
A.

Baseline reporting

B.

Continuous monitoring

C.

User access reviews

D.

Video surveillance

Questions 5

A continuously updated CMDB is an output of which NIST function and category?

Options:
A.

ID.RM

B.

ID.SC

C.

ID.BE

D.

ID.AM

Questions 6

When should event analysis be performed?

Options:
A.

Only when requested by an auditor

B.

Routinely for all events collected on a mission critical system

C.

Only at the discretion of an authorized security analyst

D.

After an event is triggered by the detection system

Questions 7

An organization has a policy to respond “ASAP” to security incidents. The security team is having a difficult time prioritizing events because they are responding to all of them, in order of receipt.

Which part of the IRP does the team need to implement or update?

Options:
A.

Scheduling of incident responses

B.

‘Post mortem’ documentation

C.

Classification of incidents

D.

Containment of incidents

Questions 8

An incident has occurred. You restore backups onto mission/business critical assets. After restoration of the

backups your services are still inaccessible on numerous assets.

What could be the cause of the issue?

Options:
A.

Unverified backups

B.

Incorrect backup strategy

C.

Hardware failure

D.

Network failure

Questions 9

In accordance with PR.MA, an organization has just truncated all log files that are more than 12 months old.

This has freed up 25 TB per logging server.

What must be updated once the truncation is verified?

Options:
A.

SDLC

B.

IRP

C.

Baseline

D.

ISCM

Questions 10

What contains a predefined set of instructions or processes that describes the management policy,

procedures, and written plan defining recovery of information systems?

Options:
A.

RAS

B.

DRP

C.

BIA

D.

BCP