The ability to carry out highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence is covered in what category of the National Cybersecurity Workforce Framework?

IT Questions BankCategory: Cyber Threat ManagementThe ability to carry out highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence is covered in what category of the National Cybersecurity Workforce Framework?

The ability to carry out highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence is covered in what category of the National Cybersecurity Workforce Framework?

  • Protect and defend
  • Oversight and development
  • Security provision
  • Analyze

Explanation: The National Institute of Standards and Technologies (NIST) created the National Cybersecurity Workforce Framework to support organizations seeking cybersecurity professionals. The framework organizes cybersecurity work into seven categories:

  • Operate and maintain - Provides the support, administration and maintenance required to ensure effective and efficient IT system performance and security.
  • Protect and defend - Identifies, analyzes, and mitigates threats to internal systems and networks.
  • Investigate - Investigates cybersecurity events and/or cyber-attacks involving IT resources.
  • Collect and operate - Provides specialized denial and deception operations and collection of cybersecurity information.
  • Analyze - Performs highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.
  • Oversee and govern - Provides leadership, management, direction or development and advocacy so an organization may effectively conduct cybersecurity work.
  • Securely provision - Conceptualizes, designs, procures or builds secure IT systems.

Exam with this question: Cybersecurity Essentials Module 8 Quiz Answers
Exam with this question: Cyber Threat Management - 1.4.2 Governance and Compliance Quiz

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments