Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 1 out of 15 pages
Viewing questions 1-10 out of questions
Questions # 1:

A consultant is hired to do physical penetration testing at a large financial company. In the first day of his

assessment, the consultant goes to the company’s building dressed like an electrician and waits in the lobby for

an employee to pass through the main access gate, then the consultant follows the employee behind to get into

the restricted area. Which type of attack did the consultant perform?

Options:

A.

Shoulder surfing


B.

Tailgating


C.

Social engineering


D.

Mantrap


Expert Solution
Questions # 2:

Which of the following BEST describes revenue?

Options:

A.

The economic benefit derived by operating a business


B.

The sum value of all assets and cash flow into the business


C.

Non-operating financial liabilities minus expenses


D.

The future profit-making potential of an organization


Expert Solution
Questions # 3:

What is the first thing that needs to be completed in order to create a security program for your organization?

Options:

A.

Risk assessment


B.

Security program budget


C.

Business continuity plan


D.

Compliance and regulatory analysis


Expert Solution
Questions # 4:

You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.

Which control is MOST important to protect AI products?

Options:

A.

Hash datasets


B.

Sanitize datasets


C.

Delete datasets


D.

Encrypt datasets


Expert Solution
Questions # 5:

An organization’s firewall technology needs replaced. A specific technology has been selected that is less costly than others and lacking in some important capabilities. The security officer has voiced concerns about sensitive data breaches but the decision is made to purchase. What does this selection indicate?

Options:

A.

A high threat environment


B.

A low risk tolerance environment


C.

I low vulnerability environment


D.

A high risk tolerance environment


Expert Solution
Questions # 6:

How is an Annual Loss Expectancy (ALE) calculated?

Options:

A.

Single Loss Expectancy multiplied by the Annual Rate of Occurrence


B.

Total loss frequency multiplied by the total loss probability


C.

Replacement cost multiplied by the total loss expectancy


D.

Value of the asset multiplied by the lifecycle loss expectancy


Expert Solution
Questions # 7:

Which of the following is the BEST choice of security metrics to present to a Board of Directors?

Options:

A.

Vulnerabilities found on servers and desktops


B.

All vulnerabilities that impact critical production servers


C.

Critical and high vulnerabilities within production environments


D.

Critical and high vulnerabilities on printers and faxes


Expert Solution
Questions # 8:

What standard provides a framework for information security risk management?

Options:

A.

International Organization for Standardization (ISO) 27005


B.

Control Objectives for Information Technology (COBIT)


C.

International Organization for Standardization (ISO) 27003


D.

Information Technology Infrastructure Library (ITIL)


Expert Solution
Questions # 9:

The Information Security Governance program MUST:

Options:

A.

integrate with other organizational governance processes


B.

support user choice for Bring Your Own Device (BYOD)


C.

integrate with other organizational governance processes


D.

show a return on investment for the organization


Expert Solution
Questions # 10:

John is the project manager for a large project in his organization. A new change request has been proposed that will affect several areas of the project. One area of the project change impact is on work that a vendor has already completed. The vendor is refusing to make the changes as they’ve already completed the project work they were contracted to do. What can John do in this instance?

Options:

A.

Refer the vendor to the Service Level Agreement (SLA) and insist that they make the changes.


B.

Review the Request for Proposal (RFP) for guidance.


C.

Withhold the vendor’s payments until the issue is resolved.


D.

Refer to the contract agreement for direction.


Expert Solution
Viewing page 1 out of 15 pages
Viewing questions 1-10 out of questions