Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 1 out of 15 pages
Viewing questions 1-10 out of questions
Questions # 1:

How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/International Standard on Assurance Engagements 3402 (ISAE3402) report of your vendors be reviewed?

Options:

A.

Quarterly


B.

Semi-annually


C.

Bi-annually


D.

Annually


Expert Solution
Questions # 2:

Which of the following is considered one of the most frequent failures in project management?

Options:

A.

Overly restrictive management


B.

Excessive personnel on project


C.

Failure to meet project deadlines


D.

Insufficient resources


Expert Solution
Questions # 3:

A stakeholder is a person or group:

Options:

A.

Vested in the success and/or failure of a project or initiative regardless of budget implications.


B.

Vested in the success and/or failure of a project or initiative and is tied to the project budget.


C.

That has budget authority.


D.

That will ultimately use the system.


Expert Solution
Questions # 4:

Which of the following methodologies references the recommended industry standard that Information security project managers should follow?

Options:

A.

The Security Systems Development Life Cycle


B.

The Security Project And Management Methodology


C.

Project Management System Methodology


D.

Project Management Body of Knowledge


Expert Solution
Questions # 5:

Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?

Options:

A.

Upper management support


B.

More frequent project milestone meetings


C.

More training of staff members


D.

Involve internal audit


Expert Solution
Questions # 6:

You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):

Options:

A.

Deploy a SEIM solution and have current staff review incidents first thing in the morning


B.

Contract with a managed security provider and have current staff on recall for incident response


C.

Configure your syslog to send SMS messages to current staff when target events are triggered


D.

Employ an assumption of breach protocol and defend only essential information resources


Expert Solution
Questions # 7:

As the CISO for your company you are accountable for the protection of information resources commensurate with:

Options:

A.

Customer demand


B.

Cost and time to replace


C.

Insurability tables


D.

Risk of exposure


Expert Solution
Questions # 8:

Which of the following are not stakeholders of IT security projects?

Options:

A.

Board of directors


B.

Third party vendors


C.

CISO


D.

Help Desk


Expert Solution
Questions # 9:

When selecting a security solution with reoccurring maintenance costs after the first year, the CISO should: (choose the BEST answer)

Options:

A.

The CISO should cut other essential programs to ensure the new solution’s continued use


B.

Communicate future operating costs to the CIO/CFO and seek commitment from them to ensure the new solution’s continued use


C.

Defer selection until the market improves and cash flow is positive


D.

Implement the solution and ask for the increased operating cost budget when it is time


Expert Solution
Questions # 10:

An example of professional unethical behavior is:

Options:

A.

Gaining access to an affiliated employee’s work email account as part of an officially sanctioned internal investigation


B.

Sharing copyrighted material with other members of a professional organization where all members have legitimate access to the material


C.

Copying documents from an employer’s server which you assert that you have an intellectual property claim to possess, but the company disputes


D.

Storing client lists and other sensitive corporate internal documents on a removable thumb drive


Expert Solution
Viewing page 1 out of 15 pages
Viewing questions 1-10 out of questions