Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

DES-9131 EMC Specialist - Infrastructure Security Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your EMC DES-9131 Specialist - Infrastructure Security Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 60 questions

Which NIST Cybersecurity Framework function should be executed before any others?

A.

Respond

B.

Protect

C.

Recover

D.

Identify

What must be done before returning a compromised laptop to normal operations in the environment?

A.

Perform a virus scan

B.

Eliminate the root cause of the compromise

C.

Re-image the device

D.

Device cannot be returned to the environment

An organization has a policy to respond “ASAP” to security incidents. The security team is having a difficult time prioritizing events because they are responding to all of them, in order of receipt.

Which part of the IRP does the team need to implement or update?

A.

Scheduling of incident responses

B.

‘Post mortem’ documentation

C.

Classification of incidents

D.

Containment of incidents

What determines the technical controls used to restrict access to USB devices and help prevent their use

within a company?

A.

Block use of the USB devices for all employees

B.

Written security policy prohibiting the use of the USB devices

C.

Acceptable use policy in the employee HR on-boarding training

D.

Detect use of the USB devices and report users

What type of system processes information, the loss of which would have a debilitating impact to an

organization?

A.

Mission critical

B.

Security critical

C.

Business critical

D.

Safety critical

What are the four tiers of integration within the NIST Cybersecurity Framework?

A.

Selective, Repeatable, Partial, and Adaptive

B.

Partial, Risk Informed, Repeatable, and Adaptive

C.

Corrective, Risk Informed, Repeatable. and Adaptive

D.

Risk Informed, Selective, Repeatable, and Partial

Refer to the exhibit.

Your organization’s security team has been working with various business units to understand their business requirements, risk tolerance, and resources used to create a Framework Profile.

Based on the Profile provided, what entries correspond to labels A, B, and C?

A.

Option A

B.

Option B

C.

Option C

What is the main goal of a gap analysis in the Identify function?

A.

Determine security controls to improve security measures

B.

Determine actions required to get from the current profile state to the target profile state

C.

Identify gaps between Cybersecurity Framework and Cyber Resilient Lifecycle pertaining to that function

D.

Identify business process gaps to improve business efficiency

The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT.

Service disruption is not a concern because this server is used only to store files and does not hold any critical workload. Your company security policy required that all forensic information must be preserved.

Which actions should you take to stop data leakage and comply with requirements of the company security policy?

A.

Disconnect the file server from the network to stop data leakage and keep it powered on for further

analysis.

B.

Shut down the server to stop the data leakage and power it up only for further forensic analysis.

C.

Restart the server to purge all malicious connections and keep it powered on for further analysis.

D.

Create a firewall rule to block all external connections for this file server and keep it powered on for further analysis.

The Backup Recovery Plan is dependent on what effort?

A.

PR.DS

B.

RTO

C.

BIA

D.

SDLC

What are the five functions of the NIST Framework Core?

A.

Identify, Protect, Detect, Respond, and Recover

B.

Governance, Identify, Recover, Respond, and Recover

C.

Protect, Detect, Respond, Governance, and Recover

D.

Identify, Respond, Protect, Detect, and Governance

The CSIRT team is following the existing recovery plans on non-production systems in a PRE-BREACH

scenario. This action is being executed in which function?

A.

Protect

B.

Recover

C.

Identify

D.

Respond

You need to review your current security baseline policy for your company and determine which security

controls need to be applied to the baseline and what changes have occurred since the last update.

Which category addresses this need?

A.

ID.AM

B.

PR.IP

C.

PR.MA

D.

ID.SC

A continuously updated CMDB is an output of which NIST function and category?

A.

ID.RM

B.

ID.SC

C.

ID.BE

D.

ID.AM

You have been tasked with documenting mission critical procedures of an organization that need to be

sustained through a significant disruption.

What document would you develop?

A.

Business Continuity Plan

B.

Business Impact Assessment

C.

Risk Analysis Report

D.

Regression Test Plan

What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and

recover from malicious computer incidents such as a denial-of-service attack?

A.

Disaster Recovery Plan

B.

Emergency Analysis Plan

C.

Crisis Communication Plan

D.

Incident Response Plan

Which mechanism within the NIST Cybersecurity Framework describes a method to capture the current state and define the target state for understanding gaps, exposure, and prioritize changes to mitigate risk?

A.

Functions

B.

Profiles

C.

Tiers

D.

Categories

Your data center uses a diesel generator as backup for two different power grids provided by your regional power company. During a period of unprecedented heat, you experience brown-outs on both grids simultaneously. The diesel generator starts up but only runs for two minutes before it also shuts down, leaving your entire data center down until grid power can be restored. Further inspection reveals a clogged fuel filter.

Failing to schedule preventive service for the backup generator is a failure in which function?

A.

Recover

B.

Respond

C.

Detect

D.

Protect

Page: 1 / 1
Total 60 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved