Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 14 out of 14 pages
Viewing questions 131-140 out of questions
Questions # 131:

Where does bottom-up financial planning primarily gain information for creating budgets?

Options:

A.

By adding all capital and operational costs from the prior budgetary cycle, and determining potential

financial shortages


B.

By reviewing last year’s program-level costs and adding a percentage of expected additional portfolio costs


C.

By adding the cost of all known individual tasks and projects that are planned for the next budgetary cycle


D.

By adding all planned operational expenses per quarter then summarizing them in a budget request


Expert Solution
Questions # 132:

The new CISO was informed of all the Information Security projects that the organization has in progress. Two projects are over a year behind schedule and over budget. Using best business practices for project management you determine that the project correctly aligns with the company goals.

Which of the following needs to be performed NEXT?

Options:

A.

Verify the scope of the project


B.

Verify the regulatory requirements


C.

Verify technical resources


D.

Verify capacity constraints


Expert Solution
Questions # 133:

Which of the following is the MOST logical method of deploying security controls within an organization?

Options:

A.

Obtain funding for all desired controls and then create project plans for implementation


B.

Apply the simpler controls as quickly as possible and use a risk-based approach for the more difficult and

costly controls


C.

Apply the least costly controls to demonstrate positive program activity


D.

Obtain business unit buy-in through close communication and coordination


Expert Solution
Questions # 134:

John is the project manager for a large project in his organization. A new change request has been proposed that will affect several areas of the project. One area of the project change impact is on work that a vendor has already completed. The vendor is refusing to make the changes as they’ve already completed the project work they were contracted to do. What can John do in this instance?

Options:

A.

Refer the vendor to the Service Level Agreement (SLA) and insist that they make the changes.


B.

Review the Request for Proposal (RFP) for guidance.


C.

Withhold the vendor’s payments until the issue is resolved.


D.

Refer to the contract agreement for direction.


Expert Solution
Questions # 135:

Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of

Options:

A.

Network based security preventative controls


B.

Software segmentation controls


C.

Network based security detective controls


D.

User segmentation controls


Expert Solution
Questions # 136:

Which of the following best describes an access control process that confirms the identity of the entity seeking

access to a logical or physical area?

Options:

A.

Identification


B.

Authorization


C.

Authentication


D.

Accountability


Expert Solution
Questions # 137:

Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.

This global retail company is expected to accept credit card payments. Which of the following is of MOST concern when defining a security program for this organization?

Options:

A.

International encryption restrictions


B.

Compliance to Payment Card Industry (PCI) data security standards


C.

Compliance with local government privacy laws


D.

Adherence to local data breach notification laws


Expert Solution
Questions # 138:

During the 3rd quarter of a budget cycle, the CISO noticed she spent more than was originally planned in her

annual budget. What is the condition of her current budgetary posture?

Options:

A.

The budget is in a temporary state of imbalance


B.

The budget is operating at a deficit


C.

She can realign the budget through moderate capital expense (CAPEX) allocation


D.

She has a surplus of operational expenses (OPEX)


Expert Solution
Viewing page 14 out of 14 pages
Viewing questions 131-140 out of questions