Pass the ECCouncil EISM 512-50 Questions and answers with CertsForce

Viewing page 12 out of 13 pages
Viewing questions 111-120 out of questions
Questions # 111:

A CISO wants to change the defense strategy to ward off attackers. To accomplish this the CISO is looking to a strategy where attackers are lured into a zone of a safe network where attackers can be monitored, controlled, quarantined, or eradicated.

Options:

A.

Moderate investment


B.

Passive monitoring


C.

Integrated security controls


D.

Dynamic deception


Expert Solution
Questions # 112:

Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.

What is one proven method to account for common elements found within separate regulations and/or standards?

Options:

A.

Hire a GRC expert


B.

Use the Find function of your word processor


C.

Design your program to meet the strictest government standards


D.

Develop a crosswalk


Expert Solution
Questions # 113:

When analyzing and forecasting a capital expense budget what are not included?

Options:

A.

Network connectivity costs


B.

New datacenter to operate from


C.

Upgrade of mainframe


D.

Purchase of new mobile devices to improve operations


Expert Solution
Questions # 114:

A CISO has implemented a risk management capability within the security portfolio. Which of the following

terms best describes this functionality?

Options:

A.

Service


B.

Program


C.

Portfolio


D.

Cost center


Expert Solution
Questions # 115:

Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.

This global retail company is expected to accept credit card payments. Which of the following is of MOST concern when defining a security program for this organization?

Options:

A.

International encryption restrictions


B.

Compliance to Payment Card Industry (PCI) data security standards


C.

Compliance with local government privacy laws


D.

Adherence to local data breach notification laws


Expert Solution
Questions # 116:

Which of the following is a primary method of applying consistent configurations to IT systems?

Options:

A.

Audits


B.

Administration


C.

Patching


D.

Templates


Expert Solution
Questions # 117:

Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.

Which of the following frameworks and standards will BEST fit the organization as a baseline for their security program?

Options:

A.

NIST and Privacy Regulations


B.

ISO 27000 and Payment Card Industry Data Security Standards


C.

NIST and data breach notification laws


D.

ISO 27000 and Human resources best practices


Expert Solution
Questions # 118:

What are the three hierarchically related aspects of strategic planning and in which order should they be done?

Options:

A.

1) Information technology strategic planning, 2) Enterprise strategic planning, 3) Cybersecurity or

information security strategic planning


B.

1) Cybersecurity or information security strategic planning, 2) Enterprise strategic planning, 3) Information

technology strategic planning


C.

1) Enterprise strategic planning, 2) Information technology strategic planning, 3) Cybersecurity or

information security strategic planning


D.

1) Enterprise strategic planning, 2) Cybersecurity or information security strategic planning, 3) Information

technology strategic planning


Expert Solution
Questions # 119:

Michael starts a new job and discovers that he has unnecessary access to a variety of systems. Which of the

following best describes the problem he has encountered?

Options:

A.

Rights collision


B.

Excessive privileges


C.

Privilege creep


D.

Least privileges


Expert Solution
Questions # 120:

The new CISO was informed of all the Information Security projects that the organization has in progress. Two projects are over a year behind schedule and over budget. Using best business practices for project management you determine that the project correctly aligns with the company goals.

Which of the following needs to be performed NEXT?

Options:

A.

Verify the scope of the project


B.

Verify the regulatory requirements


C.

Verify technical resources


D.

Verify capacity constraints


Expert Solution
Viewing page 12 out of 13 pages
Viewing questions 111-120 out of questions