Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 1 out of 14 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following can the company implement in order to avoid this type of security issue in the future?

Options:

A.

Network based intrusion detection systems


B.

A security training program for developers


C.

A risk management process


D.

A audit management process


Expert Solution
Questions # 2:

An application vulnerability assessment has identified a security flaw in an application. This is a flaw that was previously identified and remediated on a prior release of the application. Which of the following is MOST likely the reason for this recurring issue?

Options:

A.

Ineffective configuration management controls


B.

Lack of change management controls


C.

Lack of version/source controls


D.

High turnover in the application development department


Expert Solution
Questions # 3:

When gathering security requirements for an automated business process improvement program, which of the following is MOST important?

Options:

A.

Type of data contained in the process/system


B.

Type of connection/protocol used to transfer the data


C.

Type of encryption required for the data once it is at rest


D.

Type of computer the data is processed on


Expert Solution
Questions # 4:

The ultimate goal of an IT security projects is:

Options:

A.

Increase stock value


B.

Complete security


C.

Support business requirements


D.

Implement information security policies


Expert Solution
Questions # 5:

Which of the following represents the best method of ensuring business unit alignment with security program requirements?

Options:

A.

Provide clear communication of security requirements throughout the organization


B.

Demonstrate executive support with written mandates for security policy adherence


C.

Create collaborative risk management approaches within the organization


D.

Perform increased audits of security processes and procedures


Expert Solution
Questions # 6:

Which of the following is critical in creating a security program aligned with an organization’s goals?

Options:

A.

Ensure security budgets enable technical acquisition and resource allocation based on internal compliance requirements


B.

Develop a culture in which users, managers and IT professionals all make good decisions about information risk


C.

Provide clear communication of security program support requirements and audit schedules


D.

Create security awareness programs that include clear definition of security program goals and charters


Expert Solution
Questions # 7:

A newly appointed security officer finds data leakage software licenses that had never been used. The officer decides to implement a project to ensure it gets installed, but the project gets a great deal of resistance across the organization. Which of the following represents the MOST likely reason for this situation?

Options:

A.

The software license expiration is probably out of synchronization with other software licenses


B.

The project was initiated without an effort to get support from impacted business units in the organization


C.

The software is out of date and does not provide for a scalable solution across the enterprise


D.

The security officer should allow time for the organization to get accustomed to her presence before initiating security projects


Expert Solution
Questions # 8:

How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/International Standard on Assurance Engagements 3402 (ISAE3402) report of your vendors be reviewed?

Options:

A.

Quarterly


B.

Semi-annually


C.

Bi-annually


D.

Annually


Expert Solution
Questions # 9:

When managing the critical path of an IT security project, which of the following is MOST important?

Options:

A.

Knowing who all the stakeholders are.


B.

Knowing the people on the data center team.


C.

Knowing the threats to the organization.


D.

Knowing the milestones and timelines of deliverables.


Expert Solution
Questions # 10:

Which business stakeholder is accountable for the integrity of a new information system?

Options:

A.

CISO


B.

Compliance Officer


C.

Project manager


D.

Board of directors


Expert Solution
Viewing page 1 out of 14 pages
Viewing questions 1-10 out of questions