Practice Free D-CSF-SC-01 Exam Online Questions
At what cyber kill chain stage do attackers use malware to exploit specific software or hardware vulnerabilities on the target, based on the information retrieved at the reconnaissance stage?
- A . Installation
- B . Reconnaissance
- C . Weaponization
- D . Delivery
Which COBIT 2019 component aligns most closely with the "Respond" function of the NIST Cybersecurity Framework?
- A . Risk management
- B . Incident response
- C . Cybersecurity budgeting
- D . IT compliance
A company failed to detect a breach of their production system. The breach originated from a legacy system that was originally thought to be decommissioned. It turned out that system was still operating and occasionally connected to the production system for reporting purposes.
Which part of the process failed?
- A . DE.CM
- B . ID.BE
- C . ID.AM
- D . PR.DS
Continuous monitoring is crucial in the Detect Function because it:
- A . Ensures all employees are aware of security policies
- B . Provides real-time insights into potential threats
- C . Assists in system recovery
- D . Manages access to critical assets
What is a consideration when performing data collection in Information Security Continuous Monitoring?
- A . Data collection efficiency is increased through automation.
- B . The more data collected, the better chances to catch an anomaly.
- C . Collection is used only for compliance requirements.
- D . Data is best captured as it traverses the network.
In the context of the Recover Function, which of the following are critical for achieving business resiliency? (Select two)
- A . Risk assessment tools
- B . Disaster recovery testing
- C . Incident response procedures
- D . Cloud-based backup solutions
After a cybersecurity incident, which Respond Function activity focuses on assessing what went well and what could be improved?
- A . Threat intelligence gathering
- B . Root cause analysis
- C . After-action review
- D . Continuous monitoring
Which of the following is NOT one of the five core functions of the NIST Cybersecurity Framework?
- A . Protect
- B . Detect
- C . Validate
- D . Identify
When gaps are found during the ___ process, they are used to create the action plan for addressing cybersecurity risks.
- A . Risk analysis
- B . Gap assessment
- C . Policy review
- D . Compliance check
Which of the following is essential for ensuring "timely recovery to normal operations" as defined in the Recover Function?
- A . Continuous monitoring
- B . Regular training sessions
- C . A Business Continuity Plan (BCP)
- D . Security access controls