Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 5 out of 15 pages
Viewing questions 41-50 out of questions
Questions # 41:

Effective information security management programs require the active involvement of_________

Options:

A.

ClOS


B.

All employees


C.

Security Managers


D.

Executives


Expert Solution
Questions # 42:

What is a key policy that should be part of the information security plan?

Options:

A.

Account management policy


B.

Training policy


C.

Acceptable Use policy


D.

Remote Access policy


Expert Solution
Questions # 43:

Which of the following provides the BEST approach to achieving positive outcomes while preserving savings?

Options:

A.

Business Impact Analysis


B.

Cost-benefit analysis


C.

Economic impact analysis


D.

Return on Investment


Expert Solution
Questions # 44:

When managing a project, the MOST important activity in managing the expectations of stakeholders is:

Options:

A.

To force stakeholders to commit ample resources to support the project


B.

To facilitate proper communication regarding outcomes


C.

To assure stakeholders commit to the project start and end dates in writing


D.

To finalize detailed scope of the project at project initiation


Expert Solution
Questions # 45:

What two methods are used to assess risk impact?

Options:

A.

Cost and annual rate of expectance


B.

Subjective and Objective


C.

Qualitative and percent of loss realized


D.

Quantitative and qualitative


Expert Solution
Questions # 46:

A recent audit has identified a few control exceptions and is recommending the implementation of technology and processes to address the finding. Which of the following is the MOST likely reason for the organization to reject the implementation of the recommended technology and processes?

Options:

A.

The auditors have not followed proper auditing processes


B.

The CIO of the organization disagrees with the finding


C.

The risk tolerance of the organization permits this risk


D.

The organization has purchased cyber insurance


Expert Solution
Questions # 47:

You are the Chief Information Security Officer of a large, multinational bank and you suspect there is a flaw in a two factor authentication token management process. Which of the following represents your BEST course of action?

Options:

A.

Validate that security awareness program content includes information about the potential vulnerability


B.

Conduct a thorough risk assessment against the current implementation to determine system functions


C.

Determine program ownership to implement compensating controls


D.

Send a report to executive peers and business unit owners detailing your suspicions


Expert Solution
Questions # 48:

The exposure factor of a threat to your organization is defined by?

Options:

A.

Asset value times exposure factor


B.

Annual rate of occurrence


C.

Annual loss expectancy minus current cost of controls


D.

Percentage of loss experienced due to a realized threat event


Expert Solution
Questions # 49:

The effectiveness of an audit is measured by?

Options:

A.

The number of actionable items in the recommendations


B.

How it exposes the risk tolerance of the company


C.

How the recommendations directly support the goals of the company


D.

The number of security controls the company has in use


Expert Solution
Questions # 50:

You have purchased a new insurance policy as part of your risk strategy. Which of the following risk strategy options have you engaged in?

Options:

A.

Risk Avoidance


B.

Risk Acceptance


C.

Risk Transfer


D.

Risk Mitigation


Expert Solution
Viewing page 5 out of 15 pages
Viewing questions 41-50 out of questions