Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 4 out of 15 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following areas are beyond the duties of the CISO?

Options:

A.

IT security compliance


B.

lnformation Technology (IT) portfolio management


C.

Network monitoring


D.

Cybersecurity policy


Expert Solution
Questions # 32:

You have been promoted to the CISO of a retail store. Which of the following compliance standards is the MOST important to the organization?

Options:

A.

Payment Card Industry (PCI) Data Security Standard (DSS)


B.

ISO 27002


C.

NIST Cybersecurity Framework


D.

The Federal Risk and Authorization Management Program (FedRAMP)


Expert Solution
Questions # 33:

The alerting, monitoring, and lifecycle management of security-related events are typically managed by the:

Options:

A.

Security controls group


B.

Governance, risk, and compliance tools


C.

Security Threat and vulnerability management process


D.

Risk assessment process


Expert Solution
Questions # 34:

A university recently hired a CISO. One of the first tasks is to develop a continuity of operations plan (COOP).

In developing the business impact assessment (BIA), which of the following MOST closely relate to the data backup and restoral?

Options:

A.

Recovery Point Objective (RPO)


B.

Mean Time to Delivery (MTD)


C.

Recovery Time Objective (RTO)


D.

Maximum Tolerable Downtime (MTD)


Expert Solution
Questions # 35:

What is the MAIN responsibility of the purple security testing team?

Options:

A.

They emulate hackers to compromise systems


B.

The integrate the defensive Indies and controls from the Blue Team with the threats and vulnerabilities found by the Red Team


C.

They defend against simulated hacker attacks


D.

They oversee security testing and results


Expert Solution
Questions # 36:

A bastion host should be placed:

Options:

A.

Inside the DMZ


B.

In-line with the data center firewall


C.

Beyond the outer perimeter firewall


D.

As the gatekeeper to the organization’s honeynet


Expert Solution
Questions # 37:

With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:

Options:

A.

Metrics tracking security milestones, understanding criticality of information and information security, visibility into the types of information and how it is used, endorsement by the board of directors


B.

Annual security training for all employees, continual budget reviews, endorsement of the development and implementation of a security program, metrics to track the program


C.

Understanding criticality of information and information security, review investment in information security, endorse development and implementation of a security program, and require regular reports on adequacy and effectiveness


D.

Endorsement by the board of directors for security program, metrics of security program milestones, annual budget review, report on integration and acceptance of program


Expert Solution
Questions # 38:

The primary responsibility for assigning entitlements to a network share lies with which role?

Options:

A.

CISO


B.

Data owner


C.

Chief Information Officer (CIO)


D.

Security system administrator


Expert Solution
Questions # 39:

UESTION NO: 459

A company wants to fill a Chief Information Security Officer position. Which of the following qualifications and experience would be MOST desirable in a candidate?

Options:

A.

Multiple certifications, strong technical capabilities and lengthy resume


B.

Industry certifications, technical knowledge and program management skills


C.

College degree, audit capabilities and complex project management


D.

Multiple references, strong background check and industry certifications


Expert Solution
Questions # 40:

What standard would you use to help determine key performance indicators?

Options:

A.

ITIL


B.

FIPS140-2


C.

NI5TSP800-53


D.

NISTSP800-5S


Expert Solution
Viewing page 4 out of 15 pages
Viewing questions 31-40 out of questions