Pass the EMC DECS DES-9131 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

A CISO is looking for a solution to lower costs, enhance overall efficiency, and improve the reliability of

monitoring security related information.

Which ISCM feature is recommended?

Options:

A.

Reporting


B.

Provisioning


C.

Automation


D.

Collection


Expert Solution
Questions # 2:

Rank order the relative severity of impact to an organization of each plan, where “1” signifies the most impact and “4” signifies the least impact.

Question # 2


Expert Solution
Questions # 3:

What is the purpose of separation of duties?

Options:

A.

Internal control to prevent fraud


B.

Enhance exposure to functional areas


C.

Encourage collaboration


D.

Mitigate collusion and prevent theft


Expert Solution
Questions # 4:

What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and

recover from malicious computer incidents such as a denial-of-service attack?

Options:

A.

Disaster Recovery Plan


B.

Emergency Analysis Plan


C.

Crisis Communication Plan


D.

Incident Response Plan


Expert Solution
Questions # 5:

Your organization has tasked you with collecting information on all the data, personnel, devices, systems, and facilities that enable the organization to achieve its business purposes.

Which part of the NIST Cybersecurity Framework would you consult first?

Options:

A.

ID.SC


B.

DE.DP


C.

PR.AC


D.

ID.AM


Expert Solution
Questions # 6:

What contains a predefined set of instructions or processes that describes the management policy,

procedures, and written plan defining recovery of information systems?

Options:

A.

RAS


B.

DRP


C.

BIA


D.

BCP


Expert Solution
Questions # 7:

What process is used to identify an organization’s physical, digital, and human resource, as required in their Business Impact Analysis?

Options:

A.

Risk Management Strategy


B.

Risk Assessment


C.

Risk Treatment


D.

Asset Inventory


Expert Solution
Questions # 8:

Your firewall blocked several machines on your network from connecting to a malicious IP address. After

reviewing the logs, the CSIRT discovers all Microsoft Windows machines on the network have been affected based on a newly published CVE.

Based on the IRP, what should be done immediately?

Options:

A.

Update the asset inventory


B.

Contain the breach


C.

Eradicate the breach


D.

Revise the IRP


Expert Solution
Questions # 9:

A company suffers a data breach and determines that the threat actors stole or compromised 10,000 user

profiles. The company had planned for such a breach and determined the loss would be around $2 million.

Soon after restoration, the company stock suffered a 30% drop and the loss was nearly $20 million. In addition, the company received negative press.

Which area of risk did the business forget to account for?

Options:

A.

Litigation or Legal Risk


B.

Reputational Risk


C.

Vulnerability risk


D.

Business Operational Risk


Expert Solution
Questions # 10:

During what activity does an organization identify and prioritize technical, organizational, procedural,

administrative, and physical security weaknesses?

Options:

A.

Table top exercise


B.

Penetration testing


C.

Vulnerability assessment


D.

White box testing


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions