What are the four tiers of integration within the NIST Cybersecurity Framework?
Answer : B
Reference:
https://www.nist.gov/cyberframework/online-learning/components-framework
What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and recover from malicious computer incidents such as a denial-of-service attack?
Answer : D
Reference:
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf
What determines the technical controls used to restrict access to USB devices and help prevent their use within a company?
Answer : A
Concerning a risk management strategy, what should the executive level be responsible for communicating?
Answer : B