Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Specialist - Infrastructure Security Exam

Last Update 12 hours ago Total Questions : 60

The Specialist - Infrastructure Security Exam content is now fully updated, with all current exam questions added 12 hours ago. Deciding to include DES-9131 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our DES-9131 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these DES-9131 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Specialist - Infrastructure Security Exam practice test comfortably within the allotted time.

Question # 11

What is the primary objective of establishing governance and risk management processes for an organization?

A.

Manage assets effectively in accordance with local laws

B.

Minimize cybersecurity risks in conjunction with compliance processes

C.

Determine compliance controls in accordance with national laws

D.

Establish recovery time objectives for critical infrastructure

Question # 12

What must be done before returning a compromised laptop to normal operations in the environment?

A.

Perform a virus scan

B.

Eliminate the root cause of the compromise

C.

Re-image the device

D.

Device cannot be returned to the environment

Question # 13

A CISO is looking for a solution to lower costs, enhance overall efficiency, and improve the reliability of

monitoring security related information.

Which ISCM feature is recommended?

A.

Reporting

B.

Provisioning

C.

Automation

D.

Collection

Question # 14

What database is used to record and manage assets?

A.

Configuration Management Database

B.

Asset Inventory Management Database

C.

High Availability Mirrored Database

D.

Patch Management Inventory Database

Question # 15

What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and

recover from malicious computer incidents such as a denial-of-service attack?

A.

Disaster Recovery Plan

B.

Emergency Analysis Plan

C.

Crisis Communication Plan

D.

Incident Response Plan

Question # 16

What is the main goal of a gap analysis in the Identify function?

A.

Determine security controls to improve security measures

B.

Determine actions required to get from the current profile state to the target profile state

C.

Identify gaps between Cybersecurity Framework and Cyber Resilient Lifecycle pertaining to that function

D.

Identify business process gaps to improve business efficiency

Question # 17

Concerning a risk management strategy, what should the executive level be responsible for communicating?

A.

Risk mitigation

B.

Risk profile

C.

Risk tolerance

D.

Asset risk

Question # 18

What are the four tiers of integration within the NIST Cybersecurity Framework?

A.

Selective, Repeatable, Partial, and Adaptive

B.

Partial, Risk Informed, Repeatable, and Adaptive

C.

Corrective, Risk Informed, Repeatable. and Adaptive

D.

Risk Informed, Selective, Repeatable, and Partial

Go to page: