Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the EMC DECS DES-9131 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam DES-9131 Premium Access

View all detail and faqs for the DES-9131 exam


501 Students Passed

93% Average Score

91% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Rank order the relative severity of impact to an organization of each plan, where “1” signifies the most impact and “4” signifies the least impact.

Question # 1

Options:

Questions # 2:

Assume that a DDoS attack has been occurring for 72 minutes. What determines who talks to external

stakeholders?

Options:

A.

Business Continuity Plan

B.

Communication Plan

C.

Business Impact Analysis

D.

Incident Response Plan

Questions # 3:

What does a security benchmark help define?

Options:

A.

Whether or not the organization should implement ISCM

B.

The Baseline, or “as is” state

C.

Which step of the DRP to execute first

D.

What parts of the Baseline are appropriate

Questions # 4:

Which NIST Cybersecurity Framework function should be executed before any others?

Options:

A.

Respond

B.

Protect

C.

Recover

D.

Identify

Questions # 5:

When should event analysis be performed?

Options:

A.

Only when requested by an auditor

B.

Routinely for all events collected on a mission critical system

C.

Only at the discretion of an authorized security analyst

D.

After an event is triggered by the detection system

Questions # 6:

A security engineer is responsible for monitoring company software, firmware, system OS, and applications for known vulnerabilities. How should they stay current on exploits and information security?

Options:

A.

Implement security awareness training

B.

Update company policies and procedures

C.

Revise vulnerability management plan

D.

Subscribe to security mailing lists

Questions # 7:

What is part of the Pre-Recovery phase?

Options:

A.

Backup validation

B.

Validate functionality

C.

Restore assets

D.

Monitor assets

Questions # 8:

What is the main goal of a gap analysis in the Identify function?

Options:

A.

Determine security controls to improve security measures

B.

Determine actions required to get from the current profile state to the target profile state

C.

Identify gaps between Cybersecurity Framework and Cyber Resilient Lifecycle pertaining to that function

D.

Identify business process gaps to improve business efficiency

Questions # 9:

What should an organization use to effectively mitigate against password sharing to prevent unauthorized

access to systems?

Options:

A.

Access through a ticketing system

B.

Frequent password resets

C.

Strong password requirements

D.

Two factor authentication

Questions # 10:

You have been tasked with documenting mission critical procedures of an organization that need to be

sustained through a significant disruption.

What document would you develop?

Options:

A.

Business Continuity Plan

B.

Business Impact Assessment

C.

Risk Analysis Report

D.

Regression Test Plan

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.