Practice Free D-CSF-SC-23 Exam Online Questions
An Internet-connected file server compromised by a threat that leaked all data. The data was destroyed to cover all tracks. The file server has high availability capabilities to handle critical workloads. The operations team took only 15 minutes to restore workload routing to a different node.
What part(s) of the CIA Triad was affected?
- A . A only
- B . C, I
- C . C, A
- D . A, I
You have been tasked with documenting mission critical procedures of an organization that need to be sustained through a significant disruption.
What document would you develop?
- A . Business Continuity Plan
- B . Business Impact Assessment
- C . Risk Analysis Report
- D . Regression Test Plan
What activity is supported by the Protect function in the NIST Cybersecurity Framework Core?
- A . Take action regarding a detected cybersecurity event
- B . Manage cybersecurity risk to systems, assets, and data
- C . Ensure delivery of critical infrastructure services
- D . Ensure resilience and restore services impacted by a cybersecurity event
A company has just acquired an intrusion detection system (IDS) whose detection capabilities are based on behavior and baselines. The IDS has not been in production long enough to establish baselines or to understand what constitutes normal activity.
This lack prevents the CSIRT from making what determination regarding a breach?
- A . Duration
- B . Impact
- C . CVE
- D . NVD
The CSIRT discovers that an attacker changed some non-encrypted values on a database, causing an e-commerce application to show incorrect prices.
Which part(s) of the CIA Triad was affected on the database?
- A . C, I
- B . A, I
- C . A only
- D . C, A
What is the primary focus of the BIA?
- A . Prevents threats to the environment
- B . Determines criticality of assets to the business
- C . Identifies roles and responsibilities for asset recovery
- D . Maintains controls for recovery
What supports an organization in making risk management decisions to address their security posture in real time?
- A . Baseline reporting
- B . Continuous monitoring
- C . User access reviews
- D . Video surveillance
The CSF recommends that the Communication Plan for an IRP include audience, method of communication, frequency, and what other element?
- A . Incident category
- B . Message criteria
- C . Incident severity
- D . Templates to use
What database is used to record and manage assets?
- A . Configuration Management Database
- B . Asset Inventory Management Database
- C . High Availability Mirrored Database
- D . Patch Management Inventory Database
What is the primary objective of establishing governance and risk management processes for an organization?
- A . Manage assets effectively in accordance with local laws
- B . Minimize cybersecurity risks in conjunction with compliance processes
- C . Determine compliance controls in accordance with national laws
- D . Establish recovery time objectives for critical infrastructure