Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Isaca > Isaca Certification > NIST-COBIT-2019

NIST-COBIT-2019 ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019 Question and Answers

Question # 4

Combining CSF principles with COBIT 2019 practices helps to ensure value, manage risk, and support mission drivers through support and direction of:

A.

the chief information officer and IT management.

B.

the board of directors and executive management.

C.

the chief information security manager and the data protection officer.

Full Access
Question # 5

Which of the following is the MOST critical process tool to performing Implementation Phase 3-Where Do We Want to Be?

A.

Control self-assessment

B.

Gap assessment

C.

Cost-benefit analysis

Full Access
Question # 6

Identifying external compliance requirements is MOST likely to occur during which of the following COBIT implementation phases?

A.

Phase 4 - What Needs to Be Done?

B.

Phase 2 - Where Are We Now?

C.

Phase 3 - Where Do We Want to Be?

Full Access
Question # 7

Which CSF step corresponds to the COBIT objective of knowledge and understanding of enterprise goals?

A.

Step 1: Prioritize and Scope

B.

Step 6: Determine, Analyze, and Prioritize Gaps

C.

Step 4: Conduct a Risk Assessment

Full Access
Question # 8

What is the MOST important reason to compare framework profiles?

A.

To improve security posture

B.

To conduct a risk assessment

C.

To identify gaps

Full Access
Question # 9

During CSF implementation, when is an information security manager MOST likely to identify key enterprise and supporting alignment goals as

previously understood?

A.

CSF Steps 5: Create a Target Profile and 6: Determine, Analyze, and Prioritize Gaps

B.

CSF Step 1: Prioritize and Scope

C.

CSF Steps 2: Orient and 3: Create a Current Profile

Full Access
Question # 10

Which of the following is an input to COBIT Implementation Phase 1: What Are the Drivers?

A.

Risk response document

B.

Current capability rating for selected processes

C.

Program wake-up call

Full Access
Question # 11

Within the CSF Core structure, which type of capability can be implemented to help practitioners recognize potential or realized risk to enterprise assets?

A.

Protection capability

B.

Response capability

C.

Detection capability

Full Access
Question # 12

Which of the following COBIT 2019 governance principles corresponds to the CSF application stating that CSF profiles support flexibility in content and

structure?

A.

A governance system should be customized to the enterprise needs, using a set of design

factors as parameters.

B.

A governance system should focus primarily on the enterprise's IT function and information

processing.

C.

A governance system should clearly distinguish between governance and management

activities and structures.

Full Access
Question # 13

During Step 3: Create a Current Profile, an enterprise outcome has reached a 95% subcategory maturity level. How would this level of achievement be

described in the COBIT Performance Management Rating Scale?

A.

Largely Achieved

B.

Partially Achieved

C.

Fully Achieved

Full Access
Question # 14

Which of the following COBIT tasks and activities corresponds to CSF Step 1: Prioritize and Scope?

A.

Understand the enterprise's capacity and capability for change.

B.

Use change agents to communicate informally and formally.

C.

Determine ability to implement the change.

Full Access
Question # 15

Which of the following should an organization review to gain a better understanding of the likelihood and impact of cybersecurity events?

A.

Relevant internal or external capability benchmarks

B.

Cybersecurity frameworks, standards, and guidelines

C.

Cyber threat information from internal and external sources

Full Access