Practice Free D-CSF-SC-01 Exam Online Questions
What database is used to record and manage assets?
- A . Configuration Management Database
- B . Asset Inventory Management Database
- C . High Availability Mirrored Database
- D . Patch Management Inventory Database
What method identifies the ‘delta’ in projected time for RTO and actual time to complete?
- A . Risk Management Strategy
- B . Gap Analysis
- C . Recovery Planning
- D . Business Impact Analysis
What is the primary driver of a successful implementation of a security policy within a company?
- A . Change management process
- B . Regular review of processes and procedures
- C . Management commitment
- D . Regulatory compliance
When evaluating a cybersecurity framework, COBIT 2019 emphasizes ___ as a key design factor for tailoring the framework to the organization.
- A . Compliance obligations
- B . Organizational risk appetite
- C . Current technology infrastructure
- D . Employee cybersecurity training
What must be included in the CMDB?
- A . Inventory of uninstalled software
- B . Software End User Licensing Agreements
- C . Dependencies of installed components
- D . Known vulnerabilities of installed software
The __________ component of the Respond Function involves ensuring that all affected parties, both internal and external, receive timely updates during an incident.
- A . Communications Plan
- B . Recovery Strategy
- C . Incident Analysis
- D . Continuous Monitoring
Which element is essential in the Protect Function to ensure systems remain secure and maintain operational integrity?
- A . Regular backups
- B . Baseline configurations
- C . Continuous threat monitoring
- D . Disaster recovery plans
What should be inventoried within an organization using an asset inventory software application?
- A . Data, devices, identities, and software
- B . Data, devices, software, and audit logs
- C . Data, personas, identities, and CMDB
- D . Data, profiles, software, and system logs
In the NIST Cybersecurity Framework, which of the following components is key to ensuring continuity in critical functions after a cybersecurity event?
- A . Protect
- B . Identify
- C . Recover
- D . Detect
What is the primary objective of establishing governance and risk management processes for an organization?
- A . Manage assets effectively in accordance with local laws
- B . Minimize cybersecurity risks in conjunction with compliance processes
- C . Determine compliance controls in accordance with national laws
- D . Establish recovery time objectives for critical infrastructure