New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca NIST-COBIT-2019 Exam - Topic 3 Question 6 Discussion

Actual exam question for Isaca's NIST-COBIT-2019 exam
Question #: 6
Topic #: 3
[All NIST-COBIT-2019 Questions]

Which of the following is associated with the "Detect" core function of the NIST Cybersecurity Framework?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Vallie
3 months ago
I’m surprised A isn’t included in Detect.
upvoted 0 times
...
Ressie
3 months ago
100% agree with B!
upvoted 0 times
...
Meghann
3 months ago
Wait, is Risk Assessment really not part of Detect?
upvoted 0 times
...
Elly
4 months ago
I thought it was A, but B makes sense too.
upvoted 0 times
...
Dierdre
4 months ago
Definitely B, Anomalies and Events!
upvoted 0 times
...
Leah
4 months ago
I recall that Information Protection Processes and Procedures are more about safeguarding data, not really detection. So, I agree with B as well.
upvoted 0 times
...
Nadine
4 months ago
I’m not entirely sure, but I feel like Risk Assessment might relate more to the "Identify" function. Maybe I’m overthinking it?
upvoted 0 times
...
Lorita
4 months ago
I remember practicing a question similar to this, and I think it was about how to recognize unusual activities. So, B makes sense to me too.
upvoted 0 times
...
Celia
5 months ago
I think the "Detect" function is mostly about identifying issues, so I’m leaning towards B, Anomalies and Events.
upvoted 0 times
...
Paris
5 months ago
I'm a bit confused by this question. The NIST Framework has a lot of different functions and components, and I'm not entirely sure how they all fit together. I'll have to review my notes before deciding on an answer.
upvoted 0 times
...
Winfred
5 months ago
Ah, the NIST Cybersecurity Framework, I remember this from our class discussions. I believe the "Detect" function is focused on identifying and understanding potential security issues, so I'll go with option B.
upvoted 0 times
...
Leana
5 months ago
Hmm, I'm a little unsure about this one. The "Detect" function could be related to a few different things. I'll have to think it through carefully before selecting an answer.
upvoted 0 times
...
Margurite
5 months ago
This one looks pretty straightforward. I'm pretty sure the "Detect" core function is all about identifying and responding to anomalies and events, so I'll go with option B.
upvoted 0 times
...
Doug
1 year ago
Ooh, this one's a tough one. Maybe C) Risk Assessment? Wait, no, that's not right. I'm just going to go with my gut and choose B) Anomalies and Events. Sounds like the most cybersecurity-y option to me!
upvoted 0 times
...
Denae
1 year ago
B) Anomalies and Events, for sure. I mean, what else would you be detecting if not, you know, anomalies and events? This is a no-brainer!
upvoted 0 times
...
Hubert
1 year ago
A) Information Protection Processes and Procedures? Really? That seems more like an Protect function to me. Nah, I'm going with B) Anomalies and Events.
upvoted 0 times
Tula
1 year ago
B) Anomalies and Events.
upvoted 0 times
...
Kaycee
1 year ago
A) Information Protection Processes and Procedures? Really? That seems more like an Protect function to me.
upvoted 0 times
...
...
Virgina
1 year ago
Hmm, I'm not sure about this one. I was thinking C) Risk Assessment, but I guess that's more of an Identify function. Oh well, guess I'll just wing it on this one!
upvoted 0 times
...
Janine
1 year ago
B) Anomalies and Events. This is clearly the correct answer, as the Detect function is all about identifying potential cybersecurity events.
upvoted 0 times
Latia
1 year ago
That makes sense, it's important to be able to detect any unusual activity.
upvoted 0 times
...
Elizabeth
1 year ago
Anomalies and Events is definitely associated with the Detect core function.
upvoted 0 times
...
Nickie
1 year ago
I agree, the Detect function is all about identifying potential cybersecurity events.
upvoted 0 times
...
Antonette
1 year ago
I think the answer is B) Anomalies and Events.
upvoted 0 times
...
...
Nancey
1 year ago
I'm not sure, but I think C) Risk Assessment could also be associated with the Detect core function.
upvoted 0 times
...
Leatha
1 year ago
I agree with Jacki. Detecting anomalies and events is crucial for cybersecurity.
upvoted 0 times
...
Jacki
1 year ago
I think the answer is B) Anomalies and Events.
upvoted 0 times
...

Save Cancel