|Exam Name||:||Specialist - Systems Administrator, Infrastructure Security|
|Questions and Answers||:||60 Q & A|
|Updated On||:||Click to Check Update|
|PDF Download Mirror||:||DES-9131 Brain Dump|
|Get Full Version||:||Pass4sure DES-9131 Full Version|
The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT. Service disruption is not a concern because this server is used only to store files and does not hold any critical workload. Your company security policy required that all forensic information must be preserved. Which actions should you take to stop data leakage and comply with requirements of the company security policy?
Disconnect the file server from the network to stop data leakage and keep it powered on for further analysis.
Shut down the server to stop the data leakage and power it up only for further forensic analysis.
Restart the server to purge all malicious connections and keep it powered on for further analysis.
Create a firewall rule to block all external connections for this file server and keep it powered on for further analysis.
You need to review your current security baseline policy for your company and determine which security controls need to be applied to the baseline and what changes have occurred since the last update. Which category addresses this need?
https://www.google.com/url? sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=2ahUKEwjjw_fHytHgAhWvyqYKH XaVAWcQFjAAegQ ICRAC
&url=https%3A%2F%2Fwww.nist.gov%2Fdocument%2Fdraft-cybersecurity- framework-v11- corexlsx&usg=AOvVaw2wFipKqwxx2QnhlcVB2A7g
A CISO is looking for a solution to lower costs, enhance overall efficiency, and improve the reliability of monitoring security related information. Which ISCM feature is recommended?
https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-137.pdf ( 19)
What is the primary objective of establishing governance and risk management processes for an organization?
Manage assets effectively in accordance with local laws
Minimize cybersecurity risks in conjunction with compliance processes
Determine compliance controls in accordance with national laws
Establish recovery time objectives for critical infrastructure
During what activity does an organization identify and prioritize technical, organizational, procedural, administrative, and physical security weaknesses?
Table top exercise
White box testing
Refer to the exhibit.
Your organization’s security team has been working with various business units to understand their business requirements, risk tolerance, and resources used to create a Framework Profile. Based on the Profile provided, what entries correspond to labels A, B, and C?
Which document is designed to limit damage, reduce recovery time, and reduce costs where possible to the organization?
Business Impact Analysis
Business Continuity Plan
Risk Assessment Strategy
Incident Response Plan
A security audit of the systems on a network must be performed to determine their compliance with security policies. Which control should be used for the audit?
In accordance with PR.MA, an organization has just truncated all log files that are more than 12 months old. This has freed up 25 TB per logging server. What must be updated once the truncation is verified?