1.
What supports an organization in making risk management decisions to address their security posture in real time?
2.
Which mechanism within the NIST Cybersecurity Framework describes a method to capture the current state and define the target state for understanding gaps,
exposure, and prioritize changes to mitigate risk?
3.
What is the main goal of a gap analysis in the Identify function?
4.
What does a security benchmark help define?
5.
In which function is the SDLC implemented?
6.
What database is used to record and manage assets?
7.
The CSIRT team is following the existing recovery plans on non-production systems in a PRE-BREACH scenario. This action is being executed in which function?
8.
What must be included in the CMDB?
9.
What should an organization use to effectively mitigate against password sharing to prevent unauthorized access to systems?
10.
You have been tasked with documenting mission critical procedures of an organization that need to be sustained through a significant disruption. What document would you develop?