An organization has implemented network segmentation as a security control to prevent unauthorized access to sensitive data. However, the organization has recently experienced a data breach in which an attacker was able to move laterally between different segments of the network. Which of the following is the most likely reason for the failure of this control?
A system owner is considering the use of compensating controls to address a specific vulnerability. What factor should be taken into account when selecting compensating controls?
In the prepare step of the NIST RMF, which of the following should be established to ensure an effective risk management process?
During a system authorization process, the authorizing official is not satisfied with the risk assessment report's level of detail. What should the system owner do in this situation?
What NIST special publication provides guidance on continuous monitoring?
© Copyrights DumpsEngine 2025. All Rights Reserved
We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the DumpsEngine.
