All Coursera Quiz Answers

Test your knowledge: NIST frameworks Quiz Answers

In this article i am gone to share Coursera Course: Play It Safe: Manage Security Risks Week 2 Practice Quiz | Test your knowledge: NIST frameworks Quiz Answers with you..


Also visit:ย  Test your knowledge: The CIA triad Quiz Answers


 

Test your knowledge: NIST frameworks Quiz Answers

Question 1)
What is the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)?

  • A collection of security principles focused on maintaining confidentiality, integrity, and availability
  • A set of security controls that help analysts determine what to do if a data breach occurs
  • Standards, guidelines, and best practices that organizations follow voluntarily in order to manage cybersecurity risk
  • A required business framework for ensuring security updates and repairs are successful

The NIST CSF is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.

 

Question 2)
Fill in the blank: The five core functions that make up the CSF are: identify, protect, detect, _____, and recover.

  • reevaluate
  • respond
  • regulate
  • reflect

The five core functions that make up the CSF are: identify, protect, detect, respond, and recover.

 

Question 3)
Fill in the blank: The CSF _____ function relates to monitoring systems and devices in an organizationโ€™s internal network to help security teams manage potential cybersecurity risks and their effects.

  • recover
  • respond
  • identify
  • protect

The CSF identify function relates to monitoring systems and devices in an organizationโ€™s internal network to help security teams manage potential cybersecurity risks and their effects.

 

Question 4)
What does a security analystโ€™s work involve during the CSF recover function?

  • Contain, neutralize, and analyze security incidents
  • Protect an organization through the implementation of employee training
  • Return affected systems back to normal operation
  • Pinpoint threats and improve monitoring capabilities

During the recover function, a security analystโ€™s work involves returning affected systems back to normal operation.