Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 2 out of 15 pages
Viewing questions 11-20 out of questions
Questions # 11:

How often should the SSAE16 report of your vendors be reviewed?

Options:

A.

Quarterly


B.

Semi-annually


C.

Annually


D.

Bi-annually


Expert Solution
Questions # 12:

A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?

Options:

A.

tell him to shut down the server


B.

tell him to call the police


C.

tell him to invoke the incident response process


D.

tell him to analyze the problem, preserve the evidence and provide a full analysis and report


Expert Solution
Questions # 13:

Which of the following is considered a project versus a managed process?

Options:

A.

monitoring external and internal environment during incident response


B.

ongoing risk assessments of routine operations


C.

continuous vulnerability assessment and vulnerability repair


D.

installation of a new firewall system


Expert Solution
Questions # 14:

An organization has a stated requirement to block certain traffic on networks. The implementation of controls will disrupt a manufacturing process and cause unacceptable delays, resulting in sever revenue disruptions. Which of the following is MOST likely to be responsible for accepting the risk until mitigating controls can be implemented?

Options:

A.

The CISO


B.

Audit and Compliance


C.

The CFO


D.

The business owner


Expert Solution
Questions # 15:

A recommended method to document the respective roles of groups and individuals for a given process is to:

Options:

A.

Develop a detailed internal organization chart


B.

Develop a telephone call tree for emergency response


C.

Develop an isolinear response matrix with cost benefit analysis projections


D.

Develop a Responsible, Accountable, Consulted, Informed (RACI) chart


Expert Solution
Questions # 16:

Which of the following best summarizes the primary goal of a security program?

Options:

A.

Provide security reporting to all levels of an organization


B.

Create effective security awareness to employees


C.

Manage risk within the organization


D.

Assure regulatory compliance


Expert Solution
Questions # 17:

A CISO has recently joined an organization with a poorly implemented security program. The desire is to base the security program on a risk management approach. Which of the following is a foundational requirement in order to initiate this type of program?

Options:

A.

A security organization that is adequately staffed to apply required mitigation strategies and regulatory compliance solutions


B.

A clear set of security policies and procedures that are more concept-based than controls-based


C.

A complete inventory of Information Technology assets including infrastructure, networks, applications and data


D.

A clearly identified executive sponsor who will champion the effort to ensure organizational buy-in


Expert Solution
Questions # 18:

The organization does not have the time to remediate the vulnerability; however it is critical to release the application. Which of the following needs to be further evaluated to help mitigate the risks?

Options:

A.

Provide developer security training


B.

Deploy Intrusion Detection Systems


C.

Provide security testing tools


D.

Implement Compensating Controls


Expert Solution
Questions # 19:

Which of the following is the MOST important component of any change management process?

Options:

A.

Scheduling


B.

Back-out procedures


C.

Outage planning


D.

Management approval


Expert Solution
Questions # 20:

You have been hired as the Information System Security Officer (ISSO) for a US federal government agency. Your role is to ensure the security posture of the system is maintained. One of your tasks is to develop and maintain the system security plan (SSP) and supporting documentation.

Which of the following is NOT documented in the SSP?

Options:

A.

The controls in place to secure the system


B.

Name of the connected system


C.

The results of a third-party audits and recommendations


D.

Type of information used in the system


Expert Solution
Viewing page 2 out of 15 pages
Viewing questions 11-20 out of questions