Pass the EMC DECS DES-9131 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

The Backup Recovery Plan is dependent on what effort?

Options:

A.

PR.DS


B.

RTO


C.

BIA


D.

SDLC


Expert Solution
Questions # 12:

The CSIRT team is following the existing recovery plans on non-production systems in a PRE-BREACH

scenario. This action is being executed in which function?

Options:

A.

Protect


B.

Recover


C.

Identify


D.

Respond


Expert Solution
Questions # 13:

What is the main goal of a gap analysis in the Identify function?

Options:

A.

Determine security controls to improve security measures


B.

Determine actions required to get from the current profile state to the target profile state


C.

Identify gaps between Cybersecurity Framework and Cyber Resilient Lifecycle pertaining to that function


D.

Identify business process gaps to improve business efficiency


Expert Solution
Questions # 14:

Refer to the exhibit.

Question # 14

What type of item appears in the second column of the table?

Options:

A.

Subcategory


B.

Informative Reference


C.

Function


D.

Tier


Expert Solution
Questions # 15:

Your data center uses a diesel generator as backup for two different power grids provided by your regional power company. During a period of unprecedented heat, you experience brown-outs on both grids simultaneously. The diesel generator starts up but only runs for two minutes before it also shuts down, leaving your entire data center down until grid power can be restored. Further inspection reveals a clogged fuel filter.

Failing to schedule preventive service for the backup generator is a failure in which function?

Options:

A.

Recover


B.

Respond


C.

Detect


D.

Protect


Expert Solution
Questions # 16:

The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT.

Service disruption is not a concern because this server is used only to store files and does not hold any critical workload. Your company security policy required that all forensic information must be preserved.

Which actions should you take to stop data leakage and comply with requirements of the company security policy?

Options:

A.

Disconnect the file server from the network to stop data leakage and keep it powered on for further

analysis.


B.

Shut down the server to stop the data leakage and power it up only for further forensic analysis.


C.

Restart the server to purge all malicious connections and keep it powered on for further analysis.


D.

Create a firewall rule to block all external connections for this file server and keep it powered on for further analysis.


Expert Solution
Questions # 17:

What is concerned with availability, reliability, and recoverability of business processes and functions?

Options:

A.

Business Impact Analysis


B.

Business Continuity Plan


C.

Recovery Strategy


D.

Disaster Recovery Plan


Expert Solution
Questions # 18:

Your organization was breached. You informed the CSIRT and they contained the breach and eradicated the threat.

What is the next step required to ensure that you have an effective CSRL and a more robust cybersecurity posture in the future?

Options:

A.

Determine change agent


B.

Update the BIA


C.

Conduct a gap analysis


D.

Update the BCP


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions