Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 11 out of 14 pages
Viewing questions 101-110 out of questions
Questions # 101:

Many times a CISO may have to speak to the Board of Directors (BOD) about their cyber security posture. What would be the BEST choice of security metrics to present to the BOD?

Options:

A.

All vulnerabilities found on servers and desktops


B.

Only critical and high vulnerabilities on servers and desktops


C.

Only critical and high vulnerabilities that impact important production servers


D.

All vulnerabilities that impact important production servers


Expert Solution
Questions # 102:

Which of the following is a benefit of information security governance?

Options:

A.

Questioning the trust in vendor relationships.


B.

Increasing the risk of decisions based on incomplete management information.


C.

Direct involvement of senior management in developing control processes


D.

Reduction of the potential for civil and legal liability


Expert Solution
Questions # 103:

When choosing a risk mitigation method what is the MOST important factor?

Options:

A.

Approval from the board of directors


B.

Cost of the mitigation is less than the risk


C.

Metrics of mitigation method success


D.

Mitigation method complies with PCI regulations


Expert Solution
Questions # 104:

You have purchased a new insurance policy as part of your risk strategy. Which of the following risk strategy options have you engaged in?

Options:

A.

Risk Avoidance


B.

Risk Acceptance


C.

Risk Transfer


D.

Risk Mitigation


Expert Solution
Questions # 105:

Which of the following intellectual Property components is focused on maintaining brand recognition?

Options:

A.

Trademark


B.

Patent


C.

Research Logs


D.

Copyright


Expert Solution
Questions # 106:

An information security department is required to remediate system vulnerabilities when they are discovered. Please select the three primary remediation methods that can be used on an affected system.

Options:

A.

Install software patch, Operate system, Maintain system


B.

Discover software, Remove affected software, Apply software patch


C.

Install software patch, configuration adjustment, Software Removal


D.

Software removal, install software patch, maintain system


Expert Solution
Questions # 107:

A missing/ineffective security control is identified. Which of the following should be the NEXT step?

Options:

A.

Perform an audit to measure the control formally


B.

Escalate the issue to the IT organization


C.

Perform a risk assessment to measure risk


D.

Establish Key Risk Indicators


Expert Solution
Questions # 108:

As the new CISO at the company you are reviewing the audit reporting process and notice that it includes only detailed technical diagrams. What else should be in the reporting process?

Options:

A.

Executive summary


B.

Penetration test agreement


C.

Names and phone numbers of those who conducted the audit


D.

Business charter


Expert Solution
Questions # 109:

When dealing with Security Incident Response procedures, which of the following steps come FIRST when reacting to an incident?

Options:

A.

Escalation


B.

Recovery


C.

Eradication


D.

Containment


Expert Solution
Questions # 110:

Assigning the role and responsibility of Information Assurance to a dedicated and independent security group is an example of:

Options:

A.

Detective Controls


B.

Proactive Controls


C.

Preemptive Controls


D.

Organizational Controls


Expert Solution
Viewing page 11 out of 14 pages
Viewing questions 101-110 out of questions