Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 12 out of 14 pages
Viewing questions 111-120 out of questions
Questions # 111:

Why is it vitally important that senior management endorse a security policy?

Options:

A.

So that they will accept ownership for security within the organization.


B.

So that employees will follow the policy directives.


C.

So that external bodies will recognize the organizations commitment to security.


D.

So that they can be held legally accountable.


Expert Solution
Questions # 112:

What is the first thing that needs to be completed in order to create a security program for your organization?

Options:

A.

Risk assessment


B.

Security program budget


C.

Business continuity plan


D.

Compliance and regulatory analysis


Expert Solution
Questions # 113:

If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business,

they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they

will be in the organization. How would you prevent such type of attacks?

Options:

A.

Conduct thorough background checks before you engage them


B.

Hire the people through third-party job agencies who will vet them for you


C.

Investigate their social networking profiles


D.

It is impossible to block these attacks


Expert Solution
Questions # 114:

Which of the following is the MOST effective method for discovering common technical vulnerabilities within the

IT environment?

Options:

A.

Reviewing system administrator logs


B.

Auditing configuration templates


C.

Checking vendor product releases


D.

Performing system scans


Expert Solution
Questions # 115:

What are the three hierarchically related aspects of strategic planning and in which order should they be done?

Options:

A.

1) Information technology strategic planning, 2) Enterprise strategic planning, 3) Cybersecurity or

information security strategic planning


B.

1) Cybersecurity or information security strategic planning, 2) Enterprise strategic planning, 3) Information

technology strategic planning


C.

1) Enterprise strategic planning, 2) Information technology strategic planning, 3) Cybersecurity or

information security strategic planning


D.

1) Enterprise strategic planning, 2) Cybersecurity or information security strategic planning, 3) Information

technology strategic planning


Expert Solution
Questions # 116:

SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.

After determining the audit findings are accurate, which of the following is the MOST logical next activity?

Options:

A.

Begin initial gap remediation analyses


B.

Review the security organization’s charter


C.

Validate gaps with the Information Technology team


D.

Create a briefing of the findings for executive management


Expert Solution
Questions # 117:

Scenario: You are the CISO and are required to brief the C-level executive team on your information security audit for the year. During your review of the audit findings you discover that many of the controls that were put in place the previous year to correct some of the findings are not performing as needed. You have thirty days until the briefing.

To formulate a remediation plan for the non-performing controls what other document do you need to review before adjusting the controls?

Options:

A.

Business Impact Analysis


B.

Business Continuity plan


C.

Security roadmap


D.

Annual report to shareholders


Expert Solution
Questions # 118:

SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.

The CISO has validated audit findings, determined if compensating controls exist, and started initial remediation planning. Which of the following is the MOST logical next step?

Options:

A.

Validate the effectiveness of current controls


B.

Create detailed remediation funding and staffing plans


C.

Report the audit findings and remediation status to business stake holders


D.

Review security procedures to determine if they need modified according to findings


Expert Solution
Questions # 119:

As the Business Continuity Coordinator of a financial services organization, you are responsible for ensuring assets are recovered timely in the event of a disaster. Which is the BEST Disaster Recovery performance indicator to validate that you are prepared for a disaster?

Options:

A.

Recovery Point Objective (RPO)


B.

Disaster Recovery Plan


C.

Recovery Time Objective (RTO)


D.

Business Continuity Plan


Expert Solution
Questions # 120:

What is one key difference between Capital expenditures and Operating expenditures?

Options:

A.

Operating expense cannot be written off while Capital expense can


B.

Operating expenses can be depreciated over time and Capital expenses cannot


C.

Capital expenses cannot include salaries and Operating expenses can


D.

Capital expenditures allow for the cost to be depreciated over time and Operating does not


Expert Solution
Viewing page 12 out of 14 pages
Viewing questions 111-120 out of questions