New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

EMC DES-9131 Specialist - Infrastructure Security Exam Exam Practice Test

Page: 1 / 6
Total 60 questions

Specialist - Infrastructure Security Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

During what activity does an organization identify and prioritize technical, organizational, procedural,

administrative, and physical security weaknesses?

Options:

A.

Table top exercise

B.

Penetration testing

C.

Vulnerability assessment

D.

White box testing

Question 2

The Backup Recovery Plan is dependent on what effort?

Options:

A.

PR.DS

B.

RTO

C.

BIA

D.

SDLC

Question 3

What must be done before returning a compromised laptop to normal operations in the environment?

Options:

A.

Perform a virus scan

B.

Eliminate the root cause of the compromise

C.

Re-image the device

D.

Device cannot be returned to the environment

Question 4

What database is used to record and manage assets?

Options:

A.

Configuration Management Database

B.

Asset Inventory Management Database

C.

High Availability Mirrored Database

D.

Patch Management Inventory Database

Question 5

A company suffers a data breach and determines that the threat actors stole or compromised 10,000 user

profiles. The company had planned for such a breach and determined the loss would be around $2 million.

Soon after restoration, the company stock suffered a 30% drop and the loss was nearly $20 million. In addition, the company received negative press.

Which area of risk did the business forget to account for?

Options:

A.

Litigation or Legal Risk

B.

Reputational Risk

C.

Vulnerability risk

D.

Business Operational Risk

Question 6

The project manager of a data center has a budget of $1,500,000 to install critical infrastructure systems. The project will take 24 months to complete.

The project manager is working with the project management team, security experts, and stakeholders to

identify cyber risks. After reviewing the project plan, the CIO wants to know why so many risk identification meetings are requested.

What a valid reason for the repeated risk identification meetings?

Options:

A.

Identify new risks

B.

Update the company risk register

C.

Transfer risk to other project team members

D.

Prevent all risk

Question 7

You need to review your current security baseline policy for your company and determine which security

controls need to be applied to the baseline and what changes have occurred since the last update.

Which category addresses this need?

Options:

A.

ID.AM

B.

PR.IP

C.

PR.MA

D.

ID.SC

Question 8

Which document provides an implementation plan to recover business functions and processes during and after an event?

Options:

A.

Business Continuity Plan

B.

Disaster Recovery Plan

C.

Risk Assessment Strategy

D.

Business Impact Analysis

Question 9

What is considered outside the scope of a BIA?

Options:

A.

Estimated probability of the identified threats actually occurring

B.

Selection of full, incremental, or differential backups

C.

Efficiency and effectiveness of existing risk mitigation controls

D.

Determination of capacity requirements for backups

Page: 1 / 6
Total 60 questions