Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 2 out of 13 pages
Viewing questions 16-30 out of questions
Questions # 16:

The ultimate goal of an IT security projects is:

Options:

A.

Increase stock value


B.

Complete security


C.

Support business requirements


D.

Implement information security policies


Expert Solution
Questions # 17:

Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.

Which of the following is the reason the CISO has not been able to advance the security agenda in this organization?

Options:

A.

Lack of identification of technology stake holders


B.

Lack of business continuity process


C.

Lack of influence with leaders outside IT


D.

Lack of a security awareness program


Expert Solution
Questions # 18:

When gathering security requirements for an automated business process improvement program, which of the following is MOST important?

Options:

A.

Type of data contained in the process/system


B.

Type of connection/protocol used to transfer the data


C.

Type of encryption required for the data once it is at rest


D.

Type of computer the data is processed on


Expert Solution
Questions # 19:

What will a CISO analyze if she wants to understand the MOST current financial status of the organization?

Options:

A.

Annual Profit and Loss Statement


B.

Statement of Retained Earnings


C.

Statement of Proxy


D.

Balance Sheet


Expert Solution
Questions # 20:

What two methods are used to assess risk impact?

Options:

A.

Cost and annual rate of expectance


B.

Subjective and Objective


C.

Qualitative and percent of loss realized


D.

Quantitative and qualitative


Expert Solution
Questions # 21:

Which of the following BEST describes countermeasures that minimize risk?

Options:

A.

Security operations


B.

Security controls


C.

Security guidelines


D.

Security audits


Expert Solution
Questions # 22:

What is a key policy that should be part of the information security plan?

Options:

A.

Account management policy


B.

Training policy


C.

Acceptable Use policy


D.

Remote Access policy


Expert Solution
Questions # 23:

Which of the following would negatively impact a log analysis of a multinational organization?

Options:

A.

Centralized log management


B.

Encrypted log files in transit


C.

Each node set to local time


D.

Log aggregation agent each node


Expert Solution
Questions # 24:

Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?

Options:

A.

Awareness


B.

Compliance


C.

Governance


D.

Management


Expert Solution
Questions # 25:

Which represents PROPER separation of duties in the corporate environment?

Options:

A.

Information Security and Identity Access Management teams perform two distinct functions


B.

Developers and Network teams both have admin rights on servers


C.

Finance has access to Human Resources data


D.

Information Security and Network teams perform two distinct functions


Expert Solution
Questions # 26:

Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?

Options:

A.

Incident response plan


B.

Business Continuity plan


C.

Disaster recovery plan


D.

Damage control plan


Expert Solution
Questions # 27:

Using the Transport Layer Security (TLS) protocol enables a client in a network to be:

Options:

A.

Provided with a digital signature


B.

Assured of the server’s identity


C.

Identified by a network


D.

Registered by the server


Expert Solution
Questions # 28:

Which of the following best describes revenue?

Options:

A.

Non-operating financial liabilities minus expenses


B.

The true profit-making potential of an organization


C.

The sum value of all assets and cash flow into the business


D.

The economic benefit derived by operating a business


Expert Solution
Questions # 29:

Which of the following best summarizes the primary goal of a security program?

Options:

A.

Provide security reporting to all levels of an organization


B.

Create effective security awareness to employees


C.

Manage risk within the organization


D.

Assure regulatory compliance


Expert Solution
Questions # 30:

In MOST organizations which group periodically reviews network intrusion detection system logs for all systems as part of their daily tasks?

Options:

A.

Internal Audit


B.

Database Administration


C.

Information Security


D.

Compliance


Expert Solution
Viewing page 2 out of 13 pages
Viewing questions 16-30 out of questions