New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Isaca NIST-COBIT-2019 ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019 Exam Practice Test

Page: 1 / 5
Total 50 questions

ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019 Questions and Answers

Question 1

Combining CSF principles with COBIT 2019 practices helps to ensure value, manage risk, and support mission drivers through support and direction of:

Options:

A.

the chief information officer and IT management.

B.

the board of directors and executive management.

C.

the chief information security manager and the data protection officer.

Question 2

When coordinating framework implementation, the business/process level collaborates with the implementation/operations level to:

Options:

A.

develop the risk management framework.

B.

assess changes in current and future risks.

C.

create the framework profile.

Question 3

Which of the following is an objective of COBIT Implementation Phase 3-Where Do We Want to Be?

Options:

A.

Identify critical processes or other components addressed in the improvement plan.

B.

Determine the target capability for processes within governance and management

C.

objectives.

D.

Integrate the metrics for project performance and benefits realization.

Question 4

Which of the following COBIT tasks and activities corresponds to CSF Step 1: Prioritize and Scope?

Options:

A.

Understand the enterprise's capacity and capability for change.

B.

Use change agents to communicate informally and formally.

C.

Determine ability to implement the change.

Question 5

Which of the following is one of the objectives of CSF Step 6: Determine, Analyze and Prioritize Gaps?

Options:

A.

Translate improvement opportunities into justifiable, contributing projects.

B.

Direct stakeholder engagement, communication, and reporting.

C.

Communicate the I&T strategy and direction.

Question 6

Identifying external compliance requirements is MOST likely to occur during which of the following COBIT implementation phases?

Options:

A.

Phase 4 - What Needs to Be Done?

B.

Phase 2 - Where Are We Now?

C.

Phase 3 - Where Do We Want to Be?

Question 7

Which function of the CSF is addressed by incorporating governance, risk, and compliance (GRC) elements into the implementation plan?

Options:

A.

Protect

B.

Detect

C.

Identify

Question 8

Which of the following is CRITICAL for the success of CSF Step 6: Determine, Analyze and Prioritize Gaps?

Options:

A.

Identification of threats and vulnerabilities related to key assets

B.

Experience in behavioral and change management

C.

Clear understanding of the likelihood and impact of cybersecurity events

Question 9

Which of the following is the MOST important input for prioritizing resources during program initiation?

Options:

A.

Replacement cost

B.

Risk register

C.

Business impact assessment

Question 10

Which of the following should an organization review to gain a better understanding of the likelihood and impact of cybersecurity events?

Options:

A.

Relevant internal or external capability benchmarks

B.

Cybersecurity frameworks, standards, and guidelines

C.

Cyber threat information from internal and external sources

Question 11

Which of the following is a framework principle established by NIST as an initial framework consideration?

Options:

A.

Avoiding business risks

B.

Impact on global operations

C.

Ensuring regulatory compliance

Question 12

Which of the following is MOST likely to cause an organization's NIST Cybersecurity Framework (CSF) implementation to fail?

Options:

A.

Organizational training on the CSF is not provided.

B.

Potential benefits of proposed improvements are not considered.

C.

The implementation timeline is too long.

Question 13

Which of the following COBIT 2019 governance principles corresponds to the CSF application stating that CSF profiles support flexibility in content and

structure?

Options:

A.

A governance system should be customized to the enterprise needs, using a set of design

factors as parameters.

B.

A governance system should focus primarily on the enterprise's IT function and information

processing.

C.

A governance system should clearly distinguish between governance and management

activities and structures.

Question 14

What is the MOST important reason to compare framework profiles?

Options:

A.

To improve security posture

B.

To conduct a risk assessment

C.

To identify gaps

Question 15

Which COBIT implementation phase directs the development of an action plan based on the outcomes described in the Target Profile?

Options:

A.

Phase 3 -Where Do We Want to Be?

B.

Phase 5 -How Do We Get There?

C.

Phase 4 -What Needs to Be Done?

Page: 1 / 5
Total 50 questions