Which of the following statements about the NIST Cybersecurity Framework is not true?

A) One of the main goals is to address and manage cybersecurity risk in a cost-effective way to protect critical infrastructure.
B) It is aimed to replace an existing risk management process and cybersecurity program in an organization.
C) An organization that doesn’t have an existing cybersecurity program can use the NIST Cybersecurity Framework as a reference to develop such a program.
D) The NIST Cybersecurity Framework is developed with a common taxonomy.


B) It is aimed to replace an existing risk management process and cybersecurity program in an organization.

Computer Science & Information Technology

You might also like to view...

Which of the following is not a best practice for cryptographic key management?

A) Keys should be transmitted and stored by secure means. B) Keys should be properly destroyed when their lifetime ends. C) Keys should be presented in clear text. D) Key values should be random, and the full spectrum of the keyspace should be used.

Computer Science & Information Technology

You cannot insert new data into a named range

Indicate whether the statement is true or false

Computer Science & Information Technology

As your actions are recorded, VBA code is created

Indicate whether the statement is true or false

Computer Science & Information Technology

A blog application receives the data from the database server and assembles it into the blog's ____.

A. Web page B. Web browser C. Web client D. Web server

Computer Science & Information Technology