Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Your Path to Success: How to Pass the Isaca NIST-COBIT-2019 ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019 Exam

Questions 1

During CSF implementation, when is an information security manager MOST likely to identify key enterprise and supporting alignment goals as

previously understood?

Options:

A.

CSF Steps 5: Create a Target Profile and 6: Determine, Analyze, and Prioritize Gaps

B.

CSF Step 1: Prioritize and Scope

C.

CSF Steps 2: Orient and 3: Create a Current Profile

Buy Now
Questions 2

Which of the following is CRITICAL for the success of CSF Step 6: Determine, Analyze and Prioritize Gaps?

Options:

A.

Identification of threats and vulnerabilities related to key assets

B.

Experience in behavioral and change management

C.

Clear understanding of the likelihood and impact of cybersecurity events

Buy Now
Questions 3

During Step 3: Create a Current Profile, an enterprise outcome has reached a 95% subcategory maturity level. How would this level of achievement be

described in the COBIT Performance Management Rating Scale?

Options:

A.

Largely Achieved

B.

Partially Achieved

C.

Fully Achieved

Buy Now
Questions 4

Which CSF step corresponds to the COBIT objective of knowledge and understanding of enterprise goals?

Options:

A.

Step 1: Prioritize and Scope

B.

Step 6: Determine, Analyze, and Prioritize Gaps

C.

Step 4: Conduct a Risk Assessment

Buy Now
Questions 5

Which of the following COBIT 2019 governance principles corresponds to the CSF application stating that CSF profiles support flexibility in content and

structure?

Options:

A.

A governance system should be customized to the enterprise needs, using a set of design

factors as parameters.

B.

A governance system should focus primarily on the enterprise's IT function and information

processing.

C.

A governance system should clearly distinguish between governance and management

activities and structures.

Buy Now
Questions 6

Which of the following is the MOST critical process tool to performing Implementation Phase 3-Where Do We Want to Be?

Options:

A.

Control self-assessment

B.

Gap assessment

C.

Cost-benefit analysis

Buy Now
Questions 7

Combining CSF principles with COBIT 2019 practices helps to ensure value, manage risk, and support mission drivers through support and direction of:

Options:

A.

the chief information officer and IT management.

B.

the board of directors and executive management.

C.

the chief information security manager and the data protection officer.

Buy Now
Questions 8

Which of the following COBIT tasks and activities corresponds to CSF Step 1: Prioritize and Scope?

Options:

A.

Understand the enterprise's capacity and capability for change.

B.

Use change agents to communicate informally and formally.

C.

Determine ability to implement the change.

Buy Now
Questions 9

The CSF Implementation Tiers distinguish three fundamental dimensions of risk management to help enterprises evaluate which of the following?

Options:

A.

Cybersecurity posture

B.

Cybersecurity threats

C.

Cybersecurity landscape

Buy Now
Questions 10

Which function of the CSF is addressed by incorporating governance, risk, and compliance (GRC) elements into the implementation plan?

Options:

A.

Protect

B.

Detect

C.

Identify

Buy Now