Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 2 out of 14 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following methodologies references the recommended industry standard that Information security project managers should follow?

Options:

A.

The Security Systems Development Life Cycle


B.

The Security Project And Management Methodology


C.

Project Management System Methodology


D.

Project Management Body of Knowledge


Expert Solution
Questions # 12:

A stakeholder is a person or group:

Options:

A.

Vested in the success and/or failure of a project or initiative regardless of budget implications.


B.

Vested in the success and/or failure of a project or initiative and is tied to the project budget.


C.

That has budget authority.


D.

That will ultimately use the system.


Expert Solution
Questions # 13:

A system was hardened at the Operating System level and placed into the production environment. Months later an audit was performed and it identified insecure configuration different from the original hardened state. Which of the following security issues is the MOST likely reason leading to the audit findings?

Options:

A.

Lack of asset management processes


B.

Lack of change management processes


C.

Lack of hardening standards


D.

Lack of proper access controls


Expert Solution
Questions # 14:

A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?

Options:

A.

tell him to shut down the server


B.

tell him to call the police


C.

tell him to invoke the incident response process


D.

tell him to analyze the problem, preserve the evidence and provide a full analysis and report


Expert Solution
Questions # 15:

Which of the following information may be found in table top exercises for incident response?

Options:

A.

Security budget augmentation


B.

Process improvements


C.

Real-time to remediate


D.

Security control selection


Expert Solution
Questions # 16:

Which of the following represents the BEST method for obtaining business unit acceptance of security controls within an organization?

Options:

A.

Allow the business units to decide which controls apply to their systems, such as the encryption of sensitive data


B.

Create separate controls for the business units based on the types of business and functions they perform


C.

Ensure business units are involved in the creation of controls and defining conditions under which they must be applied


D.

Provide the business units with control mandates and schedules of audits for compliance validation


Expert Solution
Questions # 17:

A CISO has recently joined an organization with a poorly implemented security program. The desire is to base the security program on a risk management approach. Which of the following is a foundational requirement in order to initiate this type of program?

Options:

A.

A security organization that is adequately staffed to apply required mitigation strategies and regulatory compliance solutions


B.

A clear set of security policies and procedures that are more concept-based than controls-based


C.

A complete inventory of Information Technology assets including infrastructure, networks, applications and data


D.

A clearly identified executive sponsor who will champion the effort to ensure organizational buy-in


Expert Solution
Questions # 18:

Which of the following best summarizes the primary goal of a security program?

Options:

A.

Provide security reporting to all levels of an organization


B.

Create effective security awareness to employees


C.

Manage risk within the organization


D.

Assure regulatory compliance


Expert Solution
Questions # 19:

What oversight should the information security team have in the change management process for application security?

Options:

A.

Information security should be informed of changes to applications only


B.

Development team should tell the information security team about any application security flaws


C.

Information security should be aware of any significant application security changes and work with developer to test for vulnerabilities before changes are deployed in production


D.

Information security should be aware of all application changes and work with developers before changes are deployed in production


Expert Solution
Questions # 20:

Which of the following is MOST beneficial in determining an appropriate balance between uncontrolled innovation and excessive caution in an organization?

Options:

A.

Define the risk appetite


B.

Determine budget constraints


C.

Review project charters


D.

Collaborate security projects


Expert Solution
Viewing page 2 out of 14 pages
Viewing questions 11-20 out of questions