Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 13 out of 14 pages
Viewing questions 121-130 out of questions
Questions # 121:

The ability to demand the implementation and management of security controls on third parties providing services to an organization is

Options:

A.

Security Governance


B.

Compliance management


C.

Vendor management


D.

Disaster recovery


Expert Solution
Questions # 122:

Which of the following conditions would be the MOST probable reason for a security project to be rejected by the executive board of an organization?

Options:

A.

The Net Present Value (NPV) of the project is positive


B.

The NPV of the project is negative


C.

The Return on Investment (ROI) is larger than 10 months


D.

The ROI is lower than 10 months


Expert Solution
Questions # 123:

A large number of accounts in a hardened system were suddenly compromised to an external party. Which of

the following is the MOST probable threat actor involved in this incident?

Options:

A.

Poorly configured firewalls


B.

Malware


C.

Advanced Persistent Threat (APT)


D.

An insider


Expert Solution
Questions # 124:

The network administrator wants to strengthen physical security in the organization. Specifically, to implement a

solution stopping people from entering certain restricted zones without proper credentials. Which of following

physical security measures should the administrator use?

Options:

A.

Video surveillance


B.

Mantrap


C.

Bollards


D.

Fence


Expert Solution
Questions # 125:

Scenario: The new CISO was informed of all the Information Security projects that the section has in progress. Two projects are over a year behind schedule and way over budget.

Which of the following will be most helpful for getting an Information Security project that is behind schedule back on schedule?

Options:

A.

Upper management support


B.

More frequent project milestone meetings


C.

More training of staff members


D.

Involve internal audit


Expert Solution
Questions # 126:

When analyzing and forecasting a capital expense budget what are not included?

Options:

A.

Network connectivity costs


B.

New datacenter to operate from


C.

Upgrade of mainframe


D.

Purchase of new mobile devices to improve operations


Expert Solution
Questions # 127:

Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.

When formulating the remediation plan, what is a required input?

Options:

A.

Board of directors


B.

Risk assessment


C.

Patching history


D.

Latest virus definitions file


Expert Solution
Questions # 128:

Which of the following is an accurate statement regarding capital expenses?

Options:

A.

They are easily reduced through the elimination of usage, such as reducing power for lighting of work areas

during off-hours


B.

Capital expenses can never be replaced by operational expenses


C.

Capital expenses are typically long-term investments with value being realized through their use


D.

The organization is typically able to regain the initial cost by selling this type of asset


Expert Solution
Questions # 129:

When updating the security strategic planning document what two items must be included?

Options:

A.

Alignment with the business goals and the vision of the CIO


B.

The risk tolerance of the company and the company mission statement


C.

The executive summary and vision of the board of directors


D.

The alignment with the business goals and the risk tolerance


Expert Solution
Questions # 130:

As the Chief Information Security Officer, you want to ensure data shared securely, especially when shared with

third parties outside the organization. What protocol provides the ability to extend the network perimeter with

the use of encapsulation and encryption?

Options:

A.

File Transfer Protocol (FTP)


B.

Virtual Local Area Network (VLAN)


C.

Simple Mail Transfer Protocol


D.

Virtual Private Network (VPN)


Expert Solution
Viewing page 13 out of 14 pages
Viewing questions 121-130 out of questions