image


DES-9131 Dumps DES-9131 Braindumps

DES-9131 Real Questions DES-9131 Practice Test DES-9131 Actual Questions


DELL-EMC


DES-9131


Specialist - Systems Administrator, Infrastructure Security


https://killexams.com/pass4sure/exam-detail/DES-9131


The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT. Service disruption is not a concern because this server is used only to store files and does not hold any critical workload. Your company security policy required that all forensic information must be preserved. Which actions should you take to stop data leakage and comply with requirements of the company security policy?


  1. Disconnect the file server from the network to stop data leakage and keep it powered on for further analysis.

  2. Shut down the server to stop the data leakage and power it up only for further forensic analysis.

  3. Restart the server to purge all malicious connections and keep it powered on for further analysis.

  4. Create a firewall rule to block all external connections for this file server and keep it powered on for further analysis.


Answer: C


QUESTION: 53

You need to review your current security baseline policy for your company and determine which security controls need to be applied to the baseline and what changes have occurred since the last update. Which category addresses this need?


  1. ID.AM

  2. PR.IP

  3. PR.MA

  4. ID.SC


Answer: B


Reference:

https://www.google.com/url? sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=2ahUKEwjjw_fHytHgAhWvyqYKH XaVAWcQFjAAegQ ICRAC

&url=https%3A%2F%2Fwww.nist.gov%2Fdocument%2Fdraft-cybersecurity- framework-v11- corexlsx&usg=AOvVaw2wFipKqwxx2QnhlcVB2A7g


A CISO is looking for a solution to lower costs, enhance overall efficiency, and improve the reliability of monitoring security related information. Which ISCM feature is recommended?


  1. Reporting

  2. Provisioning

  3. Automation

  4. Collection


Answer: C


Reference:

https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-137.pdf ( 19)


QUESTION: 55

What is the primary objective of establishing governance and risk management processes for an organization?


  1. Manage assets effectively in accordance with local laws

  2. Minimize cybersecurity risks in conjunction with compliance processes

  3. Determine compliance controls in accordance with national laws

  4. Establish recovery time objectives for critical infrastructure


Answer: B


QUESTION: 56

During what activity does an organization identify and prioritize technical, organizational, procedural, administrative, and physical security weaknesses?


  1. Table top exercise

  2. Penetration testing

  3. Vulnerability assessment

  4. White box testing


Refer to the exhibit.


image


Your organization’s security team has been working with various business units to understand their business requirements, risk tolerance, and resources used to create a Framework Profile. Based on the Profile provided, what entries correspond to labels A, B, and C?


image


  1. Option A

  2. Option B

  3. Option C


Which document is designed to limit damage, reduce recovery time, and reduce costs where possible to the organization?


  1. Business Impact Analysis

  2. Business Continuity Plan

  3. Risk Assessment Strategy

  4. Incident Response Plan


Answer: B


QUESTION: 59

A security audit of the systems on a network must be performed to determine their compliance with security policies. Which control should be used for the audit?


  1. PR.DS

  2. DE.CM

  3. RS.MI

  4. ID.AM


Answer: A


QUESTION: 60

In accordance with PR.MA, an organization has just truncated all log files that are more than 12 months old. This has freed up 25 TB per logging server. What must be updated once the truncation is verified?


  1. SDLC

  2. IRP

  3. Baseline

  4. ISCM


Answer: C


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG