DES-9131 Dumps DES-9131 Braindumps

DES-9131 Real Questions DES-9131 Practice Test DES-9131 Actual Questions


killexams.com


DELL-EMC


DES-9131


Specialist - Systems Administrator, Infrastructure Security


https://killexams.com/pass4sure/exam-detail/DES-9131


The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT. Service disruption is not a concern because this server is used only to store files and does not hold any critical workload. Your company security policy required that all forensic information must be preserved. Which actions should you take to stop data leakage and comply with requirements of the company security policy?


  1. Disconnect the file server from the network to stop data leakage and keep it powered on for further analysis.

  2. Shut down the server to stop the data leakage and power it up only for further forensic analysis.

  3. Restart the server to purge all malicious connections and keep it powered on for further analysis.

  4. Create a firewall rule to block all external connections for this file server and keep it powered on for further analysis.


Answer: C


QUESTION: 53

You need to review your current security baseline policy for your company and determine which security controls need to be applied to the baseline and what changes have occurred since the last update. Which category addresses this need?


  1. ID.AM

  2. PR.IP

  3. PR.MA

  4. ID.SC


Answer: B


Reference:

https://www.google.com/url? sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=2ahUKEwjjw_fHytHgAhWvyqYKH XaVAWcQFjAAegQ ICRAC

&url=https%3A%2F%2Fwww.nist.gov%2Fdocument%2Fdraft-cybersecurity- framework-v11- corexlsx&usg=AOvVaw2wFipKqwxx2QnhlcVB2A7g


A CISO is looking for a solution to lower costs, enhance overall efficiency, and improve the reliability of monitoring security related information. Which ISCM feature is recommended?


  1. Reporting

  2. Provisioning

  3. Automation

  4. Collection


Answer: C


Reference:

https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-137.pdf ( 19)


QUESTION: 55

What is the primary objective of establishing governance and risk management processes for an organization?


  1. Manage assets effectively in accordance with local laws

  2. Minimize cybersecurity risks in conjunction with compliance processes

  3. Determine compliance controls in accordance with national laws

  4. Establish recovery time objectives for critical infrastructure


Answer: B


QUESTION: 56

During what activity does an organization identify and prioritize technical, organizational, procedural, administrative, and physical security weaknesses?


  1. Table top exercise

  2. Penetration testing

  3. Vulnerability assessment

  4. White box testing


Refer to the exhibit.



Your organization’s security team has been working with various business units to understand their business requirements, risk tolerance, and resources used to create a Framework Profile. Based on the Profile provided, what entries correspond to labels A, B, and C?



  1. Option A

  2. Option B

  3. Option C


Which document is designed to limit damage, reduce recovery time, and reduce costs where possible to the organization?


  1. Business Impact Analysis

  2. Business Continuity Plan

  3. Risk Assessment Strategy

  4. Incident Response Plan


Answer: B


QUESTION: 59

A security audit of the systems on a network must be performed to determine their compliance with security policies. Which control should be used for the audit?


  1. PR.DS

  2. DE.CM

  3. RS.MI

  4. ID.AM


Answer: A


QUESTION: 60

In accordance with PR.MA, an organization has just truncated all log files that are more than 12 months old. This has freed up 25 TB per logging server. What must be updated once the truncation is verified?


  1. SDLC

  2. IRP

  3. Baseline

  4. ISCM


Answer: C