Challenge - 5 Problems
Security Frameworks Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
📋 Factual
intermediate2:00remaining
Core focus of NIST Cybersecurity Framework
What is the primary focus of the NIST Cybersecurity Framework?
Attempts:
2 left
💡 Hint
Think about what NIST helps organizations do regarding cybersecurity risks.
✗ Incorrect
The NIST Cybersecurity Framework is designed to help organizations identify, protect, detect, respond to, and recover from cybersecurity risks.
🧠 Conceptual
intermediate2:00remaining
ISO 27001 certification purpose
What is the main purpose of ISO 27001 certification for an organization?
Attempts:
2 left
💡 Hint
ISO 27001 focuses on management systems rather than specific technologies.
✗ Incorrect
ISO 27001 certification shows that an organization has a systematic approach to managing sensitive information securely.
🔍 Analysis
advanced2:00remaining
Comparing NIST and ISO 27001 frameworks
Which statement best describes a key difference between the NIST Cybersecurity Framework and ISO 27001?
Attempts:
2 left
💡 Hint
Consider the geographic use and certification requirements of each framework.
✗ Incorrect
NIST is a voluntary framework widely used in the US, while ISO 27001 is an international standard that organizations can get formally certified against.
❓ Reasoning
advanced2:00remaining
Applying NIST Framework functions
An organization wants to improve its ability to detect cybersecurity incidents quickly. Which NIST Framework function should it focus on?
Attempts:
2 left
💡 Hint
Think about which function is about finding incidents early.
✗ Incorrect
The 'Detect' function in the NIST Framework focuses on timely discovery of cybersecurity events.
❓ Comparison
expert2:00remaining
Scope of ISO 27001 controls
Which of the following best describes the scope of controls in ISO 27001?
Attempts:
2 left
💡 Hint
ISO 27001 covers many types of controls, not just one category.
✗ Incorrect
ISO 27001 includes a broad set of controls addressing organizational policies, technical safeguards, and physical security.