DELL EMC D-CSF-SC-01 Practice Exams
Last updated on Apr 01,2025- Exam Code: D-CSF-SC-01
- Exam Name: Dell NIST Cybersecurity Framework 2.0
- Certification Provider: DELL EMC
- Latest update: Apr 01,2025
Within the Identify Function, the Business Impact Analysis helps determine ___________ in case of a cybersecurity incident.
- A . Budget allocations
- B . Asset depreciation rates
- C . Critical business functions
- D . Personnel policies
What categories are specifically contained within the Identify function?
- A . Asset Management
Governance
Risk Assessment - B . Communications
Supply Chain Management
Business Environment - C . Business Environment
Asset Management
Anomalies and Events - D . Supply Chain Risk
Data Security
Response Planning
What should an organization use to effectively mitigate against password sharing to prevent unauthorized access to systems?
- A . Access through a ticketing system
- B . Frequent password resets
- C . Strong password requirements
- D . Two factor authentication
You need to review your current security baseline policy for your company and determine which security controls need to be applied to the baseline and what changes have occurred since the last update.
Which category addresses this need?
- A . ID.AM
- B . PR.IP
- C . PR.MA
- D . ID.SC
A company failed to detect a breach of their production system. The breach originated from a legacy system that was originally thought to be decommissioned. It turned out that system was still operating and occasionally connected to the production system for reporting purposes.
Which part of the process failed?
- A . DE.CM
- B . ID.BE
- C . ID.AM
- D . PR.DS
What method identifies the ‘delta’ in projected time for RTO and actual time to complete?
- A . Risk Management Strategy
- B . Gap Analysis
- C . Recovery Planning
- D . Business Impact Analysis
What entity offers a framework that is ideally suited to handle an organization’s operational challenges?
- A . COBIT
- B . COSO
- C . NIST
- D . ISO
The ___ function in the NIST Cybersecurity Framework is responsible for developing and implementing appropriate safeguards to protect services.
- A . Detect
- B . Identify
- C . Protect
- D . Recover
You have been tasked with documenting mission critical procedures of an organization that need to be sustained through a significant disruption.
What document would you develop?
- A . Business Continuity Plan
- B . Business Impact Assessment
- C . Risk Analysis Report
- D . Regression Test Plan
The ___ function within the framework emphasizes the identification of cybersecurity events in a timely manner.
- A . Identify
- B . Detect
- C . Respond
- D . Recover