Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 3 out of 15 pages
Viewing questions 21-30 out of questions
Questions # 21:

What organizational structure combines the functional and project structures to create a hybrid of the two?

Options:

A.

Traditional


B.

Composite


C.

Project


D.

Matrix


Expert Solution
Questions # 22:

The main purpose of the SOC is:

Options:

A.

An organization which provides Tier 1 support for technology issues and provides escalation when needed


B.

A distributed organization which provides intelligence to governments and private sectors on cyber-criminal activities


C.

The coordination of personnel, processes and technology to identify information security events and provide timely response and remediation


D.

A device which consolidates event logs and provides real-time analysis of security alerts generated by applications and network hardware


Expert Solution
Questions # 23:

An auditor is reviewing the security classifications for a group of assets and finds that many of the assets are not correctly classified.

What should the auditor’s NEXT step be?

Options:

A.

Immediately notify the board of directors of the organization as to the finding


B.

Correct the classifications immediately based on the auditor’s knowledge of the proper classification


C.

Document the missing classifications


D.

Identify the owner of the asset and induce the owner to apply a proper classification


Expert Solution
Questions # 24:

Who is responsible for verifying that audit directives are implemented?

Options:

A.

IT Management


B.

Internal Audit


C.

IT Security


D.

BOD Audit Committee


Expert Solution
Questions # 25:

A Security Operations (SecOps) Manager is considering implementing threat hunting to be able to make better decisions on protecting information and assets.

What is the MAIN goal of threat hunting to the SecOps Manager?

Options:

A.

Improve discovery of valid detected events


B.

Enhance tuning of automated tools to detect and prevent attacks


C.

Replace existing threat detection strategies


D.

Validate patterns of behavior related to an attack


Expert Solution
Questions # 26:

What does RACI stand for?

Options:

A.

Reasonable, Actionable, Controlled, and Implemented


B.

Responsible, Actors, Consult, and Instigate


C.

Responsible, Accountable, Consulted, and Informed


D.

Review, Act, Communicate, and Inform


Expert Solution
Questions # 27:

What is protected by Federal Information Processing Standards (FIPS) 140-2?

Options:

A.

Integrity


B.

Confidentiality


C.

Non-repudiation


D.

Availability


Expert Solution
Questions # 28:

What is the primary difference between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?

Options:

A.

Only IDS is susceptible to false positives


B.

An IPS examines network traffic flows to detect and actively stop exploits and attacks


C.

IPS identify potentially malicious traffic based on signature or behavior and IDS does not


D.

IDS are typically deployed behind the firewall and IPS are deployed in front of the firewall


Expert Solution
Questions # 29:

What is the MOST critical output of the incident response process?

Options:

A.

A complete document of all involved team members and the support they provided


B.

Recovery of all data from affected systems


C.

Lessons learned from the incident, so they can be incorporated into the incident response processes


D.

Clearly defined documents detailing standard evidence collection and preservation processes


Expert Solution
Questions # 30:

The ability to require implementation and management of security controls within third-party provided services is a critical part of:

Options:

A.

Disaster recovery


B.

Vendor management


C.

Security Governance


D.

Compliance management


Expert Solution
Viewing page 3 out of 15 pages
Viewing questions 21-30 out of questions