Pass the ECCouncil EISM 512-50 Questions and answers with CertsForce

Viewing page 11 out of 13 pages
Viewing questions 101-110 out of questions
Questions # 101:

What are the three stages of an identity and access management system?

Options:

A.

Authentication, Authorize, Validation


B.

Provision, Administration, Enforcement


C.

Administration, Validation, Protect


D.

Provision, Administration, Authentication


Expert Solution
Questions # 102:

SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.

Which of the following is the FIRST action the CISO will perform after receiving the audit report?

Options:

A.

Inform peer executives of the audit results


B.

Validate gaps and accept or dispute the audit findings


C.

Create remediation plans to address program gaps


D.

Determine if security policies and procedures are adequate


Expert Solution
Questions # 103:

If a Virtual Machine’s (VM) data is being replicated and that data is corrupted, this corruption will automatically

be replicated to the other machine(s). What would be the BEST control to safeguard data integrity?

Options:

A.

Backup to tape


B.

Maintain separate VM backups


C.

Backup to a remote location


D.

Increase VM replication frequency


Expert Solution
Questions # 104:

The formal certification and accreditation process has four primary steps, what are they?

Options:

A.

Evaluating, describing, testing and authorizing


B.

Evaluating, purchasing, testing, authorizing


C.

Auditing, documenting, verifying, certifying


D.

Discovery, testing, authorizing, certifying


Expert Solution
Questions # 105:

Which type of scan is used on the eye to measure the layer of blood vessels?

Options:

A.

Facial recognition scan


B.

Iris scan


C.

Signature kinetics scan


D.

Retinal scan


Expert Solution
Questions # 106:

You are just hired as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget.

Using the best business practices for project management you determine that the project correct aligns with the company goals. What needs to be verified FIRST?

Options:

A.

Scope of the project


B.

Training of the personnel on the project


C.

Timeline of the project milestones


D.

Vendor for the project


Expert Solution
Questions # 107:

Which of the following best describes revenue?

Options:

A.

Non-operating financial liabilities minus expenses


B.

The true profit-making potential of an organization


C.

The sum value of all assets and cash flow into the business


D.

The economic benefit derived by operating a business


Expert Solution
Questions # 108:

Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.

Which of the following would be the FIRST step when addressing Information Security formally and consistently in this organization?

Options:

A.

Contract a third party to perform a security risk assessment


B.

Define formal roles and responsibilities for Internal audit functions


C.

Define formal roles and responsibilities for Information Security


D.

Create an executive security steering committee


Expert Solution
Questions # 109:

As the Chief Information Security Officer, you are performing an assessment of security posture to understand

what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows

to detect and actively stop vulnerability exploits and attacks?

Options:

A.

Gigamon


B.

Intrusion Prevention System


C.

Port Security


D.

Anti-virus


Expert Solution
Questions # 110:

What is the primary reason for performing vendor management?

Options:

A.

To understand the risk coverage that are being mitigated by the vendor


B.

To establish a vendor selection process


C.

To document the relationship between the company and the vendor


D.

To define the partnership for long-term success


Expert Solution
Viewing page 11 out of 13 pages
Viewing questions 101-110 out of questions