Black Friday Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

examstrack slider

How to Pass the EMC DES-9131 Exam: Comprehensive Specialist - Infrastructure Security Exam Guide and Tips

Questions 11

What is a consideration when performing data collection in Information Security Continuous Monitoring?

Options:

A.

Data collection efficiency is increased through automation.

B.

The more data collected, the better chances to catch an anomaly.

C.

Collection is used only for compliance requirements.

D.

Data is best captured as it traverses the network.

Buy Now
Questions 12

Which NIST Cybersecurity Framework function should be executed before any others?

Options:

A.

Respond

B.

Protect

C.

Recover

D.

Identify

Buy Now
Questions 13

What determines the technical controls used to restrict access to USB devices and help prevent their use

within a company?

Options:

A.

Block use of the USB devices for all employees

B.

Written security policy prohibiting the use of the USB devices

C.

Acceptable use policy in the employee HR on-boarding training

D.

Detect use of the USB devices and report users

Buy Now
Questions 14

The Backup Recovery Plan is dependent on what effort?

Options:

A.

PR.DS

B.

RTO

C.

BIA

D.

SDLC

Buy Now
Questions 15

Refer to the exhibit.

DES-9131 Question 15

Your organization’s security team has been working with various business units to understand their business requirements, risk tolerance, and resources used to create a Framework Profile.

Based on the Profile provided, what entries correspond to labels A, B, and C?

DES-9131 Question 15

Options:

A.

Option A

B.

Option B

C.

Option C

Buy Now
Questions 16

What type of system processes information, the loss of which would have a debilitating impact to an

organization?

Options:

A.

Mission critical

B.

Security critical

C.

Business critical

D.

Safety critical

Buy Now
Questions 17

What must be done before returning a compromised laptop to normal operations in the environment?

Options:

A.

Perform a virus scan

B.

Eliminate the root cause of the compromise

C.

Re-image the device

D.

Device cannot be returned to the environment

Buy Now
Questions 18

What is the main goal of a gap analysis in the Identify function?

Options:

A.

Determine security controls to improve security measures

B.

Determine actions required to get from the current profile state to the target profile state

C.

Identify gaps between Cybersecurity Framework and Cyber Resilient Lifecycle pertaining to that function

D.

Identify business process gaps to improve business efficiency

Buy Now