What are the four tiers of integration within the NIST Cybersecurity Framework?
Correct Answer:
B
🗳️
Reference:
https://www.nist.gov/cyberframework/online-learning/components-framework
What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and recover from malicious computer incidents such as a denial-of-service attack?
Correct Answer:
D
🗳️
Reference:
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf
What determines the technical controls used to restrict access to USB devices and help prevent their use within a company?
Correct Answer:
A
🗳️
Concerning a risk management strategy, what should the executive level be responsible for communicating?
Correct Answer:
B
🗳️