Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 5 out of 14 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following strategies provides the BEST response to a ransomware attack?

Options:

A.

Real-time off-site replication


B.

Daily incremental backup


C.

Daily full backup


D.

Daily differential backup


Expert Solution
Questions # 42:

What is the purpose of the statement of retained earnings of an organization?

Options:

A.

It represents the sum of all capital expenditures


B.

It represents the percentage of earnings that could in part be used to finance future security controls


C.

It represents the savings generated by the proper acquisition and implementation of security controls


D.

It has a direct correlation with the CISO’s budget


Expert Solution
Questions # 43:

Who should be involved in the development of an internal campaign to address email phishing?

Options:

A.

Business unit leaders, CIO, CEO


B.

Business Unite Leaders, CISO, CIO and CEO


C.

All employees


D.

CFO, CEO, CIO


Expert Solution
Questions # 44:

Which of the following are the triple constraints of project management?

Options:

A.

Time, quality, and scope


B.

Cost, quality, and time


C.

Scope, time, and cost


D.

Quality, scope, and cost


Expert Solution
Questions # 45:

Optical biometric recognition such as retina scanning provides access to facilities through reading the unique characteristics of a person’s eye.

However, authorization failures can occur with individuals who have?

Options:

A.

Glaucoma or cataracts


B.

Two different colored eyes (heterochromia iridium)


C.

Contact lens


D.

Malaria


Expert Solution
Questions # 46:

A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to organizational implementation and management requirements. Which of the following principles does this BEST demonstrate?

Options:

A.

Proper budget management


B.

Leveraging existing implementations


C.

Alignment with the business


D.

Effective use of existing technologies


Expert Solution
Questions # 47:

An organization recently acquired a Data Loss Prevention (DLP) solution, and two months after the implementation, it was found that sensitive data was posted to numerous Dark Web sites. The DLP application was checked, and there are no apparent malfunctions and no errors.

What is the MOST likely reason why the sensitive data was posted?

Options:

A.

The DLP Solution was not integrated with mobile device anti-malware


B.

Data classification was not properly performed on the assets


C.

The sensitive data was not encrypted while at rest


D.

A risk assessment was not performed after purchasing the DLP solution


Expert Solution
Questions # 48:

As the CISO, you are the project sponsor for a highly visible log management project. The objective of the project is to centralize all the enterprise logs into a security information and event management (SIEM) system. You requested the results of the performance quality audits activity.

The performance quality audit activity is done in what project management process group?

Options:

A.

Executing


B.

Controlling


C.

Planning


D.

Closing


Expert Solution
Questions # 49:

With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:

Options:

A.

Metrics tracking security milestones, understanding criticality of information and information security, visibility into the types of information and how it is used, endorsement by the board of directors


B.

Annual security training for all employees, continual budget reviews, endorsement of the development and implementation of a security program, metrics to track the program


C.

Understanding criticality of information and information security, review investment in information security, endorse development and implementation of a security program, and require regular reports on adequacy and effectiveness


D.

Endorsement by the board of directors for security program, metrics of security program milestones, annual budget review, report on integration and acceptance of program


Expert Solution
Questions # 50:

Which level of data destruction applies logical techniques to sanitize data in all user-addressable storage locations?

Options:

A.

Purge


B.

Clear


C.

Mangle


D.

Destroy


Expert Solution
Viewing page 5 out of 14 pages
Viewing questions 41-50 out of questions