New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

EMC DES-9131 Specialist - Infrastructure Security Exam Exam Practice Test

Page: 1 / 6
Total 60 questions

Specialist - Infrastructure Security Exam Questions and Answers

Question 1

You need to review your current security baseline policy for your company and determine which security

controls need to be applied to the baseline and what changes have occurred since the last update.

Which category addresses this need?

Options:

A.

ID.AM

B.

PR.IP

C.

PR.MA

D.

ID.SC

Question 2

What supports an organization in making risk management decisions to address their security posture in real time?

Options:

A.

Baseline reporting

B.

Continuous monitoring

C.

User access reviews

D.

Video surveillance

Question 3

Refer to the exhibit.

Question # 3

What type of item appears in the second column of the table?

Options:

A.

Subcategory

B.

Informative Reference

C.

Function

D.

Tier

Question 4

What contains a predefined set of instructions or processes that describes the management policy,

procedures, and written plan defining recovery of information systems?

Options:

A.

RAS

B.

DRP

C.

BIA

D.

BCP

Question 5

Your data center uses a diesel generator as backup for two different power grids provided by your regional power company. During a period of unprecedented heat, you experience brown-outs on both grids simultaneously. The diesel generator starts up but only runs for two minutes before it also shuts down, leaving your entire data center down until grid power can be restored. Further inspection reveals a clogged fuel filter.

Failing to schedule preventive service for the backup generator is a failure in which function?

Options:

A.

Recover

B.

Respond

C.

Detect

D.

Protect

Question 6

An incident has occurred. You restore backups onto mission/business critical assets. After restoration of the

backups your services are still inaccessible on numerous assets.

What could be the cause of the issue?

Options:

A.

Unverified backups

B.

Incorrect backup strategy

C.

Hardware failure

D.

Network failure

Question 7

Assume that a DDoS attack has been occurring for 72 minutes. What determines who talks to external

stakeholders?

Options:

A.

Business Continuity Plan

B.

Communication Plan

C.

Business Impact Analysis

D.

Incident Response Plan

Question 8

During what activity does an organization identify and prioritize technical, organizational, procedural,

administrative, and physical security weaknesses?

Options:

A.

Table top exercise

B.

Penetration testing

C.

Vulnerability assessment

D.

White box testing

Question 9

What must be done before returning a compromised laptop to normal operations in the environment?

Options:

A.

Perform a virus scan

B.

Eliminate the root cause of the compromise

C.

Re-image the device

D.

Device cannot be returned to the environment

Page: 1 / 6
Total 60 questions