Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ISC CPA Exam

Beoordeling
-
Verkocht
-
Pagina's
9
Cijfer
A+
Geüpload op
30-09-2024
Geschreven in
2024/2025

CIS control 2: inventory and control of software assets - answer-Actively manage all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution. NIST CSF Framework Core - Components - answer-Identify Protect Detect Respond Recover NIST - Identify CORE - answer-Focuses on creating canonical records of the assets an organization uses to support information processing operations NIST - Protect CORE - answer-Focuses on safeguards and access controls to networks, applications and other devices deployed as well as regular updates to security software, including encryption for sensitive information, data backups, plans for disposing of files or unused devices NIST - Detect CORE - answer-Identifies the tools and resources needed to detect active cybersecurity attacks, which includes monitoring network access points, user NIST - Respond CORE - answer-Outlines how a company should contain a cybersecurity event, react using planned responses that mitigate losses, and notify all affected parties NIST - Recover CORE - answer-Focuses on supporting the restoration of a company's network to normal operations through repairing equipment, restoring backed up files or environments, and positioning employees to rebound with the right response NIST CSF - Implementation Tiers THINK INTEGRATION - answer-Tier 1 - Partial (lowest level) Tier 2 - Risk Informed Tier 3 - Repeatable Tier 4 - Adaptive (highest level) NIST CSF - Tier 1 (Partial) - answer-Risk management process - Risk management is ad hoc (on the fly) and reactive where prioritization of info security efforts is not strategic or directed by organizational priority. Risk Management Program Integration - Incident management is ad hoc and not integrated into organizational processes. External Participation - Corporate cybersecurity is isolated, and the organization does not evaluate external risks NIST CSF - Tier 2 (Risk-informed) - answer-Risk management process- cybersecurity prioritization is based on organizational risk, and management approves cybersecurity efforts; however, cybersecurity may be isolated from organizational processes Risk management program integration - The rest of the organization is aware of cybersecurity, but not managing securely. There is awareness, but no integration External participation - There is awareness of how the security risks impact the organization, but inconsistent actions are taken to respond to those tasks NIST CSF - Tier 3 (Repeatable) - answer-Risk management process- utilizes cybersecurity in planning and has enshrined cybersecurity practices that are documented Risk management program integration- organizational risk approach to cybersecurity where cybersecurity is integrated into planning and regularly communicated among senior leadership External participation- governance structures internally to manage cyber risk NIST CSF - Tier 4 (Adaptive) - answer-Risk management process- based on iterative improvement based on internal and extern Risk management program integration- organization wide affair/prioritized similarly to other forms of organizational risk External participation- robustly participates in external information sharing activities and frequently contributes to cybersecurity community National Institute of Standards and technology (NIST) - answer-established to remove barriers to industrial competitiveness and improve access to resources to promote U.S. research capabilities/In 1995 NIST branched out into cybersecurity field with publication 800-12 CSF Framework Profiles Definition - answer-Implementation guides: Organizational goals industry goals legal and regulatory requirements industry best practices risk management priorities CSF Framework Profile breakout - answer-Current profile - current state of organizational risk management Target profile - desired future state of organizational risk management Gap analysis - difference between current and desired state NIST Privacy Framework - answer-implemented to protect individuals' data as used in data processing applications divided into 8 main functions: Govern Control Communicate Identify C/P Protect C/P Detect respond

Meer zien Lees minder
Instelling
ISC CPA E
Vak
ISC CPA E

Voorbeeld van de inhoud

ISC CPA Exam
CIS control 2: inventory and control of software assets - answer-Actively manage all software on the
network so that only authorized software is installed and can execute, and that unauthorized and
unmanaged software is found and prevented from installation or execution.



NIST CSF Framework Core - Components - answer-Identify

Protect

Detect

Respond

Recover



NIST - Identify CORE - answer-Focuses on creating canonical records of the assets an organization uses
to support information processing operations



NIST - Protect CORE - answer-Focuses on safeguards and access controls to networks, applications and
other devices deployed as well as regular updates to security software, including encryption for sensitive
information, data backups, plans for disposing of files or unused devices



NIST - Detect CORE - answer-Identifies the tools and resources needed to detect active cybersecurity
attacks, which includes monitoring network access points, user



NIST - Respond CORE - answer-Outlines how a company should contain a cybersecurity event, react
using planned responses that mitigate losses, and notify all affected parties



NIST - Recover CORE - answer-Focuses on supporting the restoration of a company's network to normal
operations through repairing equipment, restoring backed up files or environments, and positioning
employees to rebound with the right response



NIST CSF - Implementation Tiers THINK INTEGRATION - answer-Tier 1 - Partial (lowest level)

Tier 2 - Risk Informed

, Tier 3 - Repeatable

Tier 4 - Adaptive (highest level)



NIST CSF - Tier 1 (Partial) - answer-Risk management process - Risk management is ad hoc (on the fly)
and reactive where prioritization of info security efforts is not strategic or directed by organizational
priority.



Risk Management Program Integration - Incident management is ad hoc and not integrated into
organizational processes.



External Participation - Corporate cybersecurity is isolated, and the organization does not evaluate
external risks



NIST CSF - Tier 2 (Risk-informed) - answer-Risk management process- cybersecurity prioritization is
based on organizational risk, and management approves cybersecurity efforts; however, cybersecurity
may be isolated from organizational processes



Risk management program integration - The rest of the organization is aware of cybersecurity, but not
managing securely. There is awareness, but no integration



External participation - There is awareness of how the security risks impact the organization, but
inconsistent actions are taken to respond to those tasks



NIST CSF - Tier 3 (Repeatable) - answer-Risk management process- utilizes cybersecurity in planning and
has enshrined cybersecurity practices that are documented



Risk management program integration- organizational risk approach to cybersecurity where
cybersecurity is integrated into planning and regularly communicated among senior leadership



External participation- governance structures internally to manage cyber risk



NIST CSF - Tier 4 (Adaptive) - answer-Risk management process- based on iterative improvement based
on internal and extern

Geschreven voor

Instelling
ISC CPA E
Vak
ISC CPA E

Documentinformatie

Geüpload op
30 september 2024
Aantal pagina's
9
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TOPDOCTOR Abacus College, Oxford
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
10
Lid sinds
2 jaar
Aantal volgers
5
Documenten
3395
Laatst verkocht
6 maanden geleden
TOPGRADER!!

Looking for relevant and updated study material to help you ace your exams? TOPTIERGRADES has your back!!! I have essential exams, test-banks, study bites, assignments all graded A+, Have Complete solutions, and are updated regularly. Please feel free to message me if you are looking for a specific test bank that is not listed on my profile or want a test bank or exam sent to you directly as google doc link. In the event that any of the materials have an issue, please let me know and I\'ll do my best to resolve it or provide an alternative. Thank You & All The Very BEST!!!!!

Lees meer Lees minder
5.0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen