Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 5 out of 15 pages
Viewing questions 41-50 out of questions
Questions # 41:

One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?

Options:

A.

Your public key


B.

The recipient's private key


C.

The recipient's public key


D.

Certificate authority key


Expert Solution
Questions # 42:

During a cyber incident, which non-security personnel might be needed to assist the security team?

Options:

A.

Threat analyst, IT auditor, forensic analyst


B.

Network engineer, help desk technician, system administrator


C.

CIO, CFO, CSO


D.

Financial analyst, payroll clerk, HR manager


Expert Solution
Questions # 43:

Which of the following are primary concerns for management with regard to assessing internal control objectives?

Options:

A.

Confidentiality, Availability, Integrity


B.

Compliance, Effectiveness, Efficiency


C.

Communication, Reliability, Cost


D.

Confidentiality, Compliance, Cost


Expert Solution
Questions # 44:

As the CISO, you are the project sponsor for a highly visible log management project. The objective of the project is to centralize all the enterprise logs into a security information and event management (SIEM) system. You requested the results of the performance quality audits activity.

The performance quality audit activity is done in what project management process group?

Options:

A.

Executing


B.

Controlling


C.

Planning


D.

Closing


Expert Solution
Questions # 45:

ABC Limited has recently suffered a security breach with customers’ social security number available on the dark web for sale. The CISO, during the time of the incident, has been fired, and you have been hired as the replacement. The analysis of the breach found that the absence of an insider threat program, lack of least privilege policy, and weak access control was to blame. You would like to implement key performance indicators to mitigate the risk.

Which metric would meet the requirement?

Options:

A.

Number of times third parties access critical information systems


B.

Number of systems with known vulnerabilities


C.

Number of users with elevated privileges


D.

Number of websites with weak or misconfigured certificates


Expert Solution
Questions # 46:

A CISO wants to change the defense strategy to ward off attackers. To accomplish this the CISO is looking to a strategy where attackers are lured into a zone of a safe network where attackers can be monitored, controlled, quarantined, or eradicated.

Options:

A.

Moderate investment


B.

Passive monitoring


C.

Integrated security controls


D.

Dynamic deception


Expert Solution
Questions # 47:

To have accurate and effective information security policies how often should the CISO review the organization policies?

Options:

A.

Every 6 months


B.

Quarterly


C.

Before an audit


D.

At least once a year


Expert Solution
Questions # 48:

What is the MAIN responsibility of the purple security testing team?

Options:

A.

They emulate hackers to compromise systems


B.

The integrate the defensive Indies and controls from the Blue Team with the threats and vulnerabilities found by the Red Team


C.

They defend against simulated hacker attacks


D.

They oversee security testing and results


Expert Solution
Questions # 49:

In which of the following cases, would an organization be more prone to risk acceptance vs. risk mitigation?

Options:

A.

The organization uses exclusively a quantitative process to measure risk


B.

The organization uses exclusively a qualitative process to measure risk


C.

The organization’s risk tolerance is high


D.

The organization’s risk tolerance is lo


Expert Solution
Questions # 50:

Which of the following is the MOST logical method of deploying security controls within an organization?

Options:

A.

Obtain funding for all desired controls and then create project plans for implementation


B.

Apply the simpler controls as quickly as possible and use a risk-based approach for the more difficult andcostly controls


C.

Apply the least costly controls to demonstrate positive program activity


D.

Obtain business unit buy-in through close communication and coordination


Expert Solution
Viewing page 5 out of 15 pages
Viewing questions 41-50 out of questions