Which of the following are components of the NIST Framework for Improving Critical Infrastructure Cybersecurity? (Select all that apply.)
What will be an ideal response?
a. The organization understands the cybersecurity risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals.
b. Information and records (data) are managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability of information.
c. Security policies (that address purpose, scope, roles, responsibilities, management commitment, and coordination among organizational entities), processes, and procedures are maintained and used to manage protection of information systems and assets.
d. The information system and assets are monitored at discrete intervals to identify cybersecurity events and verify the effectiveness of protective measures.
e. Recovery processes and procedures are executed and maintained to ensure timely restoration of systems or assets affected by cybersecurity events.
You might also like to view...
Which protocol is used to encrypt data as it travels a network?
A. EFS B. Kerberos C. IPsec D. SMB
The following statement declares an array: ? int[] scoreArray = {2, 14, 35, 67, 85}; final int INCREASE = 3; ? Create a loop that will add INCREASE to every array element. Use the length field in the loop that will contain the number of elements in the array.
What will be an ideal response?