New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

DES-9131 Specialist - Infrastructure Security Exam Questions and Answers

Questions 4

Concerning a risk management strategy, what should the executive level be responsible for communicating?

Options:

A.

Risk mitigation

B.

Risk profile

C.

Risk tolerance

D.

Asset risk

Buy Now
Questions 5

A new employee is starting work at your company. When should they be informed of the company’s security policy?

Options:

A.

Based on human resource policy

B.

After the first security infraction

C.

Annual security policy review

D.

During regular security awareness sessions

Buy Now
Questions 6

Which NIST Cybersecurity Framework function should be executed before any others?

Options:

A.

Respond

B.

Protect

C.

Recover

D.

Identify

Buy Now
Questions 7

Assume that a DDoS attack has been occurring for 72 minutes. What determines who talks to external

stakeholders?

Options:

A.

Business Continuity Plan

B.

Communication Plan

C.

Business Impact Analysis

D.

Incident Response Plan

Buy Now
Questions 8

Refer to the exhibit.

Your organization’s security team has been working with various business units to understand their business requirements, risk tolerance, and resources used to create a Framework Profile.

Based on the Profile provided, what entries correspond to labels A, B, and C?

Options:

A.

Option A

B.

Option B

C.

Option C

Buy Now
Questions 9

The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT.

Service disruption is not a concern because this server is used only to store files and does not hold any critical workload. Your company security policy required that all forensic information must be preserved.

Which actions should you take to stop data leakage and comply with requirements of the company security policy?

Options:

A.

Disconnect the file server from the network to stop data leakage and keep it powered on for further

analysis.

B.

Shut down the server to stop the data leakage and power it up only for further forensic analysis.

C.

Restart the server to purge all malicious connections and keep it powered on for further analysis.

D.

Create a firewall rule to block all external connections for this file server and keep it powered on for further analysis.

Buy Now
Exam Code: DES-9131
Exam Name: Specialist - Infrastructure Security Exam
Last Update: Dec 22, 2024
Questions: 60

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99