NIST-COBIT-2019 ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019 Questions and Answers
How should gaps identified between the current and target profiles be addressed?
Which of the following should be a PRIMARY consideration when creating an action plan to address gaps identified in CSF Step 6: Determine, Analyze,
and Prioritize Gaps?
The seven high-level CSF steps generally align to which of the following in COBIT 2019?
Which of the following should an organization review to gain a better understanding of the likelihood and impact of cybersecurity events?
Identifying external compliance requirements is MOST likely to occur during which of the following COBIT implementation phases?
Which of the following is a framework principle established by NIST as an initial framework consideration?
Combining CSF principles with COBIT 2019 practices helps to ensure value, manage risk, and support mission drivers through support and direction of:
Which role will benefit MOST from a better understanding of the current cybersecurity posture by applying the CSF?
Which function of the CSF is addressed by incorporating governance, risk, and compliance (GRC) elements into the implementation plan?
During the implementation of Step 2: Orient and Step 3: Create a Current Profile, the organization's asset register should primarily align to:
Which of the following is CRITICAL for the success of CSF Step 6: Determine, Analyze and Prioritize Gaps?