Pass the ECCouncil EISM 512-50 Questions and answers with CertsForce

Viewing page 4 out of 13 pages
Viewing questions 31-40 out of questions
Questions # 31:

When managing the critical path of an IT security project, which of the following is MOST important?

Options:

A.

Knowing who all the stakeholders are.


B.

Knowing the people on the data center team.


C.

Knowing the threats to the organization.


D.

Knowing the milestones and timelines of deliverables.


Expert Solution
Questions # 32:

Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?

Options:

A.

Risk Assessment


B.

Incident Response


C.

Risk Management


D.

Network Security administration


Expert Solution
Questions # 33:

Which of the following is a major benefit of applying risk levels?

Options:

A.

Risk management governance becomes easier since most risks remain low once mitigated


B.

Resources are not wasted on risks that are already managed to an acceptable level


C.

Risk budgets are more easily managed due to fewer identified risks as a result of using a methodology


D.

Risk appetite can increase within the organization once the levels are understood


Expert Solution
Questions # 34:

When should IT security project management be outsourced?

Options:

A.

When organizational resources are limited


B.

When the benefits of outsourcing outweigh the inherent risks of outsourcing


C.

On new, enterprise-wide security initiatives


D.

On projects not forecasted in the yearly budget


Expert Solution
Questions # 35:

A severe security threat has been detected on your corporate network. As CISO you quickly assemble key members of the Information Technology team and business operations to determine a modification to security controls in response to the threat. This is an example of:

Options:

A.

Change management


B.

Business continuity planning


C.

Security Incident Response


D.

Thought leadership


Expert Solution
Questions # 36:

A department within your company has proposed a third party vendor solution to address an urgent, critical business need. As the CISO you have been asked to accelerate screening of their security control claims. Which of the following vendor provided documents is BEST to make your decision:

Options:

A.

Vendor’s client list of reputable organizations currently using their solution


B.

Vendor provided attestation of the detailed security controls from a reputable accounting firm


C.

Vendor provided reference from an existing reputable client detailing their implementation


D.

Vendor provided internal risk assessment and security control documentation


Expert Solution
Questions # 37:

You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):

Options:

A.

Deploy a SEIM solution and have current staff review incidents first thing in the morning


B.

Contract with a managed security provider and have current staff on recall for incident response


C.

Configure your syslog to send SMS messages to current staff when target events are triggered


D.

Employ an assumption of breach protocol and defend only essential information resources


Expert Solution
Questions # 38:

A recommended method to document the respective roles of groups and individuals for a given process is to:

Options:

A.

Develop a detailed internal organization chart


B.

Develop a telephone call tree for emergency response


C.

Develop an isolinear response matrix with cost benefit analysis projections


D.

Develop a Responsible, Accountable, Consulted, Informed (RACI) chart


Expert Solution
Questions # 39:

A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?

Options:

A.

Alignment with the business


B.

Effective use of existing technologies


C.

Leveraging existing implementations


D.

Proper budget management


Expert Solution
Questions # 40:

Knowing the potential financial loss an organization is willing to suffer if a system fails is a determination of which of the following?

Options:

A.

Cost benefit


B.

Risk appetite


C.

Business continuity


D.

Likelihood of impact


Expert Solution
Viewing page 4 out of 13 pages
Viewing questions 31-40 out of questions