Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 3 out of 14 pages
Viewing questions 21-30 out of questions
Questions # 21:

A severe security threat has been detected on your corporate network. As CISO you quickly assemble key members of the Information Technology team and business operations to determine a modification to security controls in response to the threat. This is an example of:

Options:

A.

Change management


B.

Business continuity planning


C.

Security Incident Response


D.

Thought leadership


Expert Solution
Questions # 22:

To get an Information Security project back on schedule, which of the following will provide the MOST help?

Options:

A.

Upper management support


B.

More frequent project milestone meetings


C.

Stakeholder support


D.

Extend work hours


Expert Solution
Questions # 23:

A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?

Options:

A.

Alignment with the business


B.

Effective use of existing technologies


C.

Leveraging existing implementations


D.

Proper budget management


Expert Solution
Questions # 24:

Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?

Options:

A.

Upper management support


B.

More frequent project milestone meetings


C.

More training of staff members


D.

Involve internal audit


Expert Solution
Questions # 25:

You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):

Options:

A.

Deploy a SEIM solution and have current staff review incidents first thing in the morning


B.

Contract with a managed security provider and have current staff on recall for incident response


C.

Configure your syslog to send SMS messages to current staff when target events are triggered


D.

Employ an assumption of breach protocol and defend only essential information resources


Expert Solution
Questions # 26:

When is an application security development project complete?

Options:

A.

When the application is retired.


B.

When the application turned over to production.


C.

When the application reaches the maintenance phase.


D.

After one year.


Expert Solution
Questions # 27:

As the CISO for your company you are accountable for the protection of information resources commensurate with:

Options:

A.

Customer demand


B.

Cost and time to replace


C.

Insurability tables


D.

Risk of exposure


Expert Solution
Questions # 28:

The company decides to release the application without remediating the high-risk vulnerabilities. Which of the following is the MOST likely reason for the company to release the application?

Options:

A.

The company lacks a risk management process


B.

The company does not believe the security vulnerabilities to be real


C.

The company has a high risk tolerance


D.

The company lacks the tools to perform a vulnerability assessment


Expert Solution
Questions # 29:

When information security falls under the Chief Information Officer (CIO), what is their MOST essential role?

Options:

A.

Oversees the organization’s day-to-day operations, creating the policies and strategies that govern operations


B.

Enlisting support from key executives the information security program budget and policies


C.

Charged with developing and implementing policies designed to protect employees and customers’ data from unauthorized access


D.

Responsible for the success or failure of the IT organization and setting strategic direction


Expert Solution
Questions # 30:

Which of the following is the MOST effective method to counter phishing attacks?

Options:

A.

User awareness and training


B.

Host based Intrusion Detection System (IPS)


C.

Acceptable use guide signed by all system users


D.

Antispam solution


Expert Solution
Viewing page 3 out of 14 pages
Viewing questions 21-30 out of questions