Halloween Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 2
Total 18 questions
Exam Code: DES-9131                Update: Oct 31, 2025
Exam Name: Specialist - Infrastructure Security Exam

EMC Specialist - Infrastructure Security Exam DES-9131 Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

What are the five functions of the NIST Framework Core?

A.

Identify, Protect, Detect, Respond, and Recover

B.

Governance, Identify, Recover, Respond, and Recover

C.

Protect, Detect, Respond, Governance, and Recover

D.

Identify, Respond, Protect, Detect, and Governance

Question # 2

Your organization has tasked you with collecting information on all the data, personnel, devices, systems, and facilities that enable the organization to achieve its business purposes.

Which part of the NIST Cybersecurity Framework would you consult first?

A.

ID.SC

B.

DE.DP

C.

PR.AC

D.

ID.AM

Question # 3

What is the purpose of separation of duties?

A.

Internal control to prevent fraud

B.

Enhance exposure to functional areas

C.

Encourage collaboration

D.

Mitigate collusion and prevent theft

Question # 4

Refer to the exhibit.

Your organization’s security team has been working with various business units to understand their business requirements, risk tolerance, and resources used to create a Framework Profile.

Based on the Profile provided, what entries correspond to labels A, B, and C?

A.

Option A

B.

Option B

C.

Option C

Question # 5

Your firewall blocked several machines on your network from connecting to a malicious IP address. After

reviewing the logs, the CSIRT discovers all Microsoft Windows machines on the network have been affected based on a newly published CVE.

Based on the IRP, what should be done immediately?

A.

Update the asset inventory

B.

Contain the breach

C.

Eradicate the breach

D.

Revise the IRP

Question # 6

A new employee is starting work at your company. When should they be informed of the company’s security policy?

A.

Based on human resource policy

B.

After the first security infraction

C.

Annual security policy review

D.

During regular security awareness sessions

Question # 7

What is a consideration when performing data collection in Information Security Continuous Monitoring?

A.

Data collection efficiency is increased through automation.

B.

The more data collected, the better chances to catch an anomaly.

C.

Collection is used only for compliance requirements.

D.

Data is best captured as it traverses the network.

Question # 8

Which mechanism within the NIST Cybersecurity Framework describes a method to capture the current state and define the target state for understanding gaps, exposure, and prioritize changes to mitigate risk?

A.

Functions

B.

Profiles

C.

Tiers

D.

Categories

Question # 9

What contains a predefined set of efforts that describes an organization’s mission/business critical processes, and defines how they will be sustained during and after a significant disruption?

A.

Disaster Recovery Plan

B.

Risk Assessment Strategy

C.

Business Continuity Plan

D.

Business Impact Analysis

Question # 10

What type of system processes information, the loss of which would have a debilitating impact to an

organization?

A.

Mission critical

B.

Security critical

C.

Business critical

D.

Safety critical

Page: 1 / 2
Total 18 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 31 Oct 2025