Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Specialist - Infrastructure Security Exam Question and Answers

Specialist - Infrastructure Security Exam

Last Update May 16, 2024
Total Questions : 60

We are offering FREE DES-9131 EMC exam questions. All you do is to just go and sign up. Give your details, prepare DES-9131 free exam questions and then go for complete pool of Specialist - Infrastructure Security Exam test questions that will help you more.

DES-9131 pdf

DES-9131 PDF

$35  $99.99
DES-9131 Engine

DES-9131 Testing Engine

$42  $119.99
DES-9131 PDF + Engine

DES-9131 PDF + Testing Engine

$56  $159.99
Questions 1

Which document is designed to limit damage, reduce recovery time, and reduce costs where possible to the organization?

Options:

A.  

Business Impact Analysis

B.  

Business Continuity Plan

C.  

Risk Assessment Strategy

D.  

Incident Response Plan

Discussion 0
Questions 2

What contains a predefined set of instructions or processes that describes the management policy,

procedures, and written plan defining recovery of information systems?

Options:

A.  

RAS

B.  

DRP

C.  

BIA

D.  

BCP

Discussion 0
Questions 3

The CSIRT team is following the existing recovery plans on non-production systems in a PRE-BREACH

scenario. This action is being executed in which function?

Options:

A.  

Protect

B.  

Recover

C.  

Identify

D.  

Respond

Discussion 0
Questions 4

Which NIST Cybersecurity Framework category ensures that organizational communication and data flows are mapped?

Options:

A.  

ID.AM

B.  

ID.GV

C.  

ID.RA

D.  

I

D.  

SC

Discussion 0
Questions 5

The project manager of a data center has a budget of $1,500,000 to install critical infrastructure systems. The project will take 24 months to complete.

The project manager is working with the project management team, security experts, and stakeholders to

identify cyber risks. After reviewing the project plan, the CIO wants to know why so many risk identification meetings are requested.

What a valid reason for the repeated risk identification meetings?

Options:

A.  

Identify new risks

B.  

Update the company risk register

C.  

Transfer risk to other project team members

D.  

Prevent all risk

Discussion 0
Questions 6

A company implemented an intrusion detection system. They notice the system generates a very large number of false alarms.

What steps should the company take to rectify this situation?

Options:

A.  

Re-evaluate the Baseline and make necessary adjustments to the detection rules

B.  

Replace the intrusion detection system with an intrusion protection system

C.  

Define how to identify and disregard the false alarms

D.  

Consider evaluating a system from another vendor

Discussion 0
Questions 7

Match the security event to its description.

Options:

Discussion 0
Questions 8

An incident has occurred. You restore backups onto mission/business critical assets. After restoration of the

backups your services are still inaccessible on numerous assets.

What could be the cause of the issue?

Options:

A.  

Unverified backups

B.  

Incorrect backup strategy

C.  

Hardware failure

D.  

Network failure

Discussion 0
Questions 9

What is the purpose of separation of duties?

Options:

A.  

Internal control to prevent fraud

B.  

Enhance exposure to functional areas

C.  

Encourage collaboration

D.  

Mitigate collusion and prevent theft

Discussion 0