Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 3 out of 13 pages
Viewing questions 31-45 out of questions
Questions # 31:

In which of the following examples would an organization be more willing to accept a risk instead of mitigating it?

Options:

A.

The risk tolerance within the organization is high


B.

The organization’s risk tolerance is low


C.

The organization primarily uses qualitative risk measurement


D.

The organization’s risk management program is mature


Expert Solution
Questions # 32:

Devising controls for information security is a balance between?

Options:

A.

Governance and compliance


B.

Auditing and security


C.

Budget and risk tolerance


D.

Threats and vulnerabilities


Expert Solution
Questions # 33:

Which of the following is a critical operational component of an Incident Response Program (IRP)?

Options:

A.

Weekly program budget reviews to ensure the percentage of program funding remains constant.


B.

Annual review of program charters, policies, procedures and organizational agreements.


C.

Daily monitoring of vulnerability advisories relating to your organization’s deployed technologies.


D.

Monthly program tests to ensure resource allocation is sufficient for supporting the needs of the organization


Expert Solution
Questions # 34:

File Integrity Monitoring (FIM) is considered a

Options:

A.

Network based security preventative control


B.

Software segmentation control


C.

Security detective control


D.

User segmentation control


Expert Solution
Questions # 35:

Which of the following conditions would be the MOST probable reason for a security project to be rejected by the executive board of an organization?

Options:

A.

The Net Present Value (NPV) of the project is negative


B.

The Return on Investment (ROI) is less than 10 months


C.

The Return on Investment (ROI) is longer than 10 months


D.

The Net Present Value (NPV) of the project is positive


Expert Solution
Questions # 36:

In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?

Options:

A.

High risk environments 6 months, low risk environments 12 months


B.

Every 12 months


C.

Every 18 months


D.

Every six months


Expert Solution
Questions # 37:

What should an auditor do after discovering that a security analyst is working a late-night shift every week as the senior server administrator?

Options:

A.

Inform the security officer of the need for an exception


B.

Inform senior management of the risk


C.

Immediately review the system logs of all servers


D.

Ensure additional monitoring is applied to the security analyst


Expert Solution
Questions # 38:

The primary purpose of a risk register is to:

Options:

A.

Maintain a log of discovered risks


B.

Track individual risk assessments


C.

Develop plans for mitigating identified risks


D.

Coordinate the timing of scheduled risk assessments


Expert Solution
Questions # 39:

Providing oversight of an information security program for the organization is the primary responsibility of which group?

Options:

A.

Office of the Auditor


B.

Senior Executives


C.

Office of the General Counsel


D.

All employees and users


Expert Solution
Questions # 40:

Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?

Options:

A.

Poses a strong technical background


B.

Understand all regulations affecting the organization


C.

Understand the business goals of the organization


D.

Poses a strong auditing background


Expert Solution
Questions # 41:

One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?

Options:

A.

Your public key


B.

The recipient's private key


C.

The recipient's public key


D.

Certificate authority key


Expert Solution
Questions # 42:

During a cyber incident, which non-security personnel might be needed to assist the security team?

Options:

A.

Threat analyst, IT auditor, forensic analyst


B.

Network engineer, help desk technician, system administrator


C.

CIO, CFO, CSO


D.

Financial analyst, payroll clerk, HR manager


Expert Solution
Questions # 43:

Which of the following are primary concerns for management with regard to assessing internal control objectives?

Options:

A.

Confidentiality, Availability, Integrity


B.

Compliance, Effectiveness, Efficiency


C.

Communication, Reliability, Cost


D.

Confidentiality, Compliance, Cost


Expert Solution
Questions # 44:

As the CISO, you are the project sponsor for a highly visible log management project. The objective of the project is to centralize all the enterprise logs into a security information and event management (SIEM) system. You requested the results of the performance quality audits activity.

The performance quality audit activity is done in what project management process group?

Options:

A.

Executing


B.

Controlling


C.

Planning


D.

Closing


Expert Solution
Questions # 45:

ABC Limited has recently suffered a security breach with customers’ social security number available on the dark web for sale. The CISO, during the time of the incident, has been fired, and you have been hired as the replacement. The analysis of the breach found that the absence of an insider threat program, lack of least privilege policy, and weak access control was to blame. You would like to implement key performance indicators to mitigate the risk.

Which metric would meet the requirement?

Options:

A.

Number of times third parties access critical information systems


B.

Number of systems with known vulnerabilities


C.

Number of users with elevated privileges


D.

Number of websites with weak or misconfigured certificates


Expert Solution
Viewing page 3 out of 13 pages
Viewing questions 31-45 out of questions