Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

CCSFP Questions and Answers

Question # 6

In an i1 assessment a Control Reference score of 62 would yield which result?

A.

An optional CAP for all gaps within the associated Requirement Statements

B.

A required CAP for all gaps within the associated Requirement Statements

C.

A HITRUST certification

D.

A Control Reference gap

Full Access
Question # 7

An i1 Control Reference that scores a 37 would yield what result?

A.

Required CAP

B.

HITRUST Certification

C.

Risk Acceptance

D.

No Gap

E.

Function Gap

Full Access
Question # 8

Corrective Action Plans (CAPs) can be viewed centrally across multiple assessment objects.

A.

True

B.

False

Full Access
Question # 9

If an organization requires an assessment with the highest level of assurance, which assessment type should they choose?

A.

i1 Validated

B.

i1 Readiness

C.

r2 Validated

D.

e1 Validated with RDS enabled

Full Access
Question # 10

Can certification be achieved when scoring 100% on the following maturity levels within an r2 Assessment Object?

    Policy: 100%

    Procedure: 100%

    Implementation: 100%

    Measured: 0%

    Managed: 0%

A.

Yes

B.

No

Full Access
Question # 11

On an r2 assessment, when considering the CAP vs. gap decision, will CAPs be required if a Control Reference has an aggregate raw score of 72.5 across Requirement Statements with gaps?

A.

Yes

B.

No

Full Access
Question # 12

Which assessment type tests against requirement statements considered essential to cybersecurity hygiene?

A.

e1 Assessment

B.

r2 Assessment

C.

Targeted Assessment

D.

i1 Assessment

E.

None of the above

Full Access
Question # 13

Can multiple assessments be performed on your organization simultaneously?

A.

Yes

B.

No

Full Access
Question # 14

When considering third-party reports for reliance, what must be included in the report? (Select all that apply)

A.

Description of scope

B.

Completed remediation for testing exceptions

C.

List of procedures performed

D.

Executive summary

E.

Conclusions reached for each test

Full Access
Question # 15

Does the HITRUST CSF encompass all requirements from the authoritative sources mapped to an assessment object?

A.

Yes

B.

No

Full Access
Question # 16

What characteristics would allow grouping of multiple like components together?

A.

Systems with the same configurations

B.

Systems with the same patch levels

C.

Facilities with the same access management systems

D.

All of the above

Full Access
Question # 17

Control Reference scores are averaged to determine Domain scores.

A.

True

B.

False

Full Access
Question # 18

Gaps with required CAPs must be remediated within six months.

A.

True

B.

False

Full Access
Question # 19

It is possible to test only privacy-related requirements to obtain a HITRUST privacy certification.

A.

True

B.

False

Full Access
Question # 20

A validated assessment may lead to either a validated report or a validated report with certification.

A.

True

B.

False

Full Access
Question # 21

A MyCSF Subscription is required to perform a Readiness Assessment.

A.

True

B.

False

Full Access
Question # 22

If most of the evaluative elements associated with a requirement statement do not apply to an assessed entity’s control environment, the requirement statement can be marked "N/A".

A.

True

B.

False

Full Access
Question # 23

Which of the following are true with e1, i1, and r2 assessment types? (Select all that apply)

A.

All evaluate core cybersecurity hygiene

B.

All can vary requirement statement counts based on added compliance factors

C.

r2 assessments can include fewer than 19 domains, while e1 and i1 assessments require 19 domains

D.

All require testing of the control implementation

Full Access
Question # 24

The Subscribers Comments field should be populated with the rationale for any requirement statement marked not-applicable (N/A).

A.

True

B.

False

Full Access
Question # 25

If a requirement statement beginning with "The Privacy Officer..." scored a 50 instead of 42, would the overall assessment achieve certification?

A.

True

B.

False

Full Access
Question # 26

How is the sample of Requirement Statements within an interim assessment selected for testing?

A.

By the assessor personnel

B.

By client personnel

C.

Randomly by the MyCSF tool

D.

Any with associated gaps

E.

Any with required CAPs

Full Access
Question # 27

MyCSF analytics can be used to visualize data within an assessment object as well as across all assessment objects within an organization.

A.

True

B.

False

Full Access
Question # 28

Is the Payment Card Industry – Data Security Standard (PCI-DSS) a Risk Management Framework (RMF)?

A.

Yes

B.

No

Full Access
Question # 29

When scoping an r2 assessment, selecting regulatory factors is required and may generate additional Requirement Statements in the assessment object.

A.

True

B.

False

Full Access
Question # 30

During a HITRUST Assessment, what percentage of External Assessor hours must be performed by a CCSFP?

A.

100%

B.

50%

C.

No formal standard

D.

30%

Full Access