Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 6 out of 15 pages
Viewing questions 51-60 out of questions
Questions # 51:

The Security Operations Center (SOC) just purchased a new intrusion prevention system (IPS) that needs to be deployed in-line for best defense. The IT group is concerned about putting the new IPS in-line because it might negatively impact network availability. What would be the BEST approach for the CISO to reassure the IT group?

Options:

A.

Work with the IT group and tell them to put IPS in-line and say it won’t cause any network impact


B.

Explain to the IT group that the IPS won’t cause any network impact because it will fail open


C.

Explain to the IT group that this is a business need and the IPS will fail open however, if there is a network failure the CISO will accept responsibility


D.

Explain to the IT group that the IPS will fail open once in-line however it will be deployed in monitor mode for a set period of time to ensure that it doesn’t block any legitimate traffic


Expert Solution
Questions # 52:

Which of the following is critical for maintaining a successful information security management program?

Options:

A.

A successful Chief Information Officer


B.

Vendor awareness and guidance


C.

Leadership support


D.

Focused security guidelines


Expert Solution
Questions # 53:

Your company has limited resources to spend on security initiatives. The Chief Financial Officer asks you to prioritize the protection of information resources based on their value to the company. It is essential that you be able to communicate in language that your fellow executives will understand. You should:

Options:

A.

Create timelines for mitigation


B.

Develop a cost-benefit analysis


C.

Calculate annual loss expectancy


D.

Create a detailed technical executive summary


Expert Solution
Questions # 54:

The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?

Options:

A.

The need to change accounting periods on a regular basis.


B.

The requirement to post entries for a closed accounting period.


C.

The need to create and modify the chart of accounts and its allocations.


D.

The lack of policies and procedures for the proper segregation of duties.


Expert Solution
Questions # 55:

What is the definition of Risk in Information Security?

Options:

A.

Risk = Probability x Impact


B.

Risk = Threat x Probability


C.

Risk = Financial Impact x Probability


D.

Risk = Impact x Threat


Expert Solution
Questions # 56:

The executive board has requested that the CISO define Key Performance Indicators (KPIs) to measure the effectiveness of the security awareness program. Which information would be MOST useful?

Options:

A.

Annual number of help desk tickets with the word “security” in them


B.

Total number of employees that reported unsuccessful social engineering attacks


C.

Month-by-month percentages of employees that failed phishing tests


D.

Number of alerts detected by the Security Operations Center


Expert Solution
Questions # 57:

Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.

This global retail company is expected to accept credit card payments. Which of the following is of MOST concern when defining a security program for this organization?

Options:

A.

International encryption restrictions


B.

Compliance to Payment Card Industry (PCI) data security standards


C.

Compliance with local government privacy laws


D.

Adherence to local data breach notification laws


Expert Solution
Questions # 58:

The single most important consideration to make when developing your security program, policies, and processes is:

Options:

A.

Budgeting for unforeseen data compromises


B.

Streamlining for efficiency


C.

Alignment with the business


D.

Establishing your authority as the Security Executive


Expert Solution
Questions # 59:

The organization does not have the time to remediate the vulnerability; however it is critical to release the application. Which of the following needs to be further evaluated to help mitigate the risks?

Options:

A.

Provide developer security training


B.

Deploy Intrusion Detection Systems


C.

Provide security testing tools


D.

Implement Compensating Controls


Expert Solution
Questions # 60:

This occurs when the quantity or quality of project deliverables is expanded from the original project plan.

Options:

A.

Scope creep


B.

Deadline extension


C.

Scope modification


D.

Deliverable expansion


Expert Solution
Viewing page 6 out of 15 pages
Viewing questions 51-60 out of questions