Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

NIST-COBIT-2019 ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019 Questions and Answers

Questions 4

How should gaps identified between the current and target profiles be addressed?

Options:

A.

Comparing to and acting on the desired Tier level

B.

With a full project engagement to close all gaps

C.

Through a risk based-approach

Buy Now
Questions 5

Which of the following should be a PRIMARY consideration when creating an action plan to address gaps identified in CSF Step 6: Determine, Analyze,

and Prioritize Gaps?

Options:

A.

Mission drivers

B.

Stakeholder map

C.

IT process descriptions

Buy Now
Questions 6

The seven high-level CSF steps generally align to which of the following in COBIT 2019?

Options:

A.

High-level phases

B.

High-level functions

C.

High-level categories

Buy Now
Questions 7

Which of the following should an organization review to gain a better understanding of the likelihood and impact of cybersecurity events?

Options:

A.

Relevant internal or external capability benchmarks

B.

Cybersecurity frameworks, standards, and guidelines

C.

Cyber threat information from internal and external sources

Buy Now
Questions 8

Identifying external compliance requirements is MOST likely to occur during which of the following COBIT implementation phases?

Options:

A.

Phase 4 - What Needs to Be Done?

B.

Phase 2 - Where Are We Now?

C.

Phase 3 - Where Do We Want to Be?

Buy Now
Questions 9

Which of the following is a framework principle established by NIST as an initial framework consideration?

Options:

A.

Avoiding business risks

B.

Impact on global operations

C.

Ensuring regulatory compliance

Buy Now
Questions 10

Combining CSF principles with COBIT 2019 practices helps to ensure value, manage risk, and support mission drivers through support and direction of:

Options:

A.

the chief information officer and IT management.

B.

the board of directors and executive management.

C.

the chief information security manager and the data protection officer.

Buy Now
Questions 11

Which role will benefit MOST from a better understanding of the current cybersecurity posture by applying the CSF?

Options:

A.

Executives

B.

Acquisition specialists

C.

Legal experts

Buy Now
Questions 12

Which function of the CSF is addressed by incorporating governance, risk, and compliance (GRC) elements into the implementation plan?

Options:

A.

Protect

B.

Detect

C.

Identify

Buy Now
Questions 13

During the implementation of Step 2: Orient and Step 3: Create a Current Profile, the organization's asset register should primarily align to:

Options:

A.

organizational strategy.

B.

configuration management.

C.

the security business case.

Buy Now
Questions 14

Which of the following is CRITICAL for the success of CSF Step 6: Determine, Analyze and Prioritize Gaps?

Options:

A.

Identification of threats and vulnerabilities related to key assets

B.

Experience in behavioral and change management

C.

Clear understanding of the likelihood and impact of cybersecurity events

Buy Now
Questions 15

Which information should be collected for a Current Profile?

Options:

A.

Implementation Status

B.

Recommended Actions

C.

Resource Required

Buy Now
Exam Code: NIST-COBIT-2019
Exam Name: ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019
Last Update: Apr 11, 2026
Questions: 50

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99