Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 6 out of 15 pages
Viewing questions 51-60 out of questions
Questions # 51:

Creating a secondary authentication process for network access would be an example of?

Options:

A.

Nonlinearities in physical security performance metrics


B.

Defense in depth cost enumerated costs


C.

System hardening and patching requirements


D.

Anti-virus for mobile devices


Expert Solution
Questions # 52:

A global health insurance company is concerned about protecting confidential information. Which of the following is of MOST concern to this organization?

Options:

A.

Compliance to the Payment Card Industry (PCI) regulations.


B.

Alignment with financial reporting regulations for each country where they operate.


C.

Alignment with International Organization for Standardization (ISO) standards.


D.

Compliance with patient data protection regulations for each country where they operate.


Expert Solution
Questions # 53:

Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?

Options:

A.

Plan-Check-Do-Act


B.

Plan-Do-Check-Act


C.

Plan-Select-Implement-Evaluate


D.

SCORE (Security Consensus Operational Readiness Evaluation)


Expert Solution
Questions # 54:

What should an organization do to ensure that they have a sound Business Continuity (BC) Plan?

Options:

A.

Test every three years to ensure that things work as planned


B.

Conduct periodic tabletop exercises to refine the BC plan


C.

Outsource the creation and execution of the BC plan to a third party vendor


D.

Conduct a Disaster Recovery (DR) exercise every year to test the plan


Expert Solution
Questions # 55:

Which of the following are primary concerns for management with regard to assessing internal control objectives?

Options:

A.

Confidentiality, Availability, Integrity


B.

Compliance, Effectiveness, Efficiency


C.

Communication, Reliability, Cost


D.

Confidentiality, Compliance, Cost


Expert Solution
Questions # 56:

Which of the following represents the BEST reason for an organization to use the Control Objectives for Information and Related Technology (COBIT) as an Information Technology (IT) framework?

Options:

A.

It allows executives to more effectively monitor IT implementation costs


B.

Implementation of it eases an organization’s auditing and compliance burden


C.

Information Security (IS) procedures often require augmentation with other standards


D.

It provides for a consistent and repeatable staffing model for technology organizations


Expert Solution
Questions # 57:

Which of the following is MOST likely to be discretionary?

Options:

A.

Policies


B.

Procedures


C.

Guidelines


D.

Standards


Expert Solution
Questions # 58:

Which of the following tests is an IS auditor performing when a sample of programs is selected to determine if the source and object versions are the same?

Options:

A.

A substantive test of program library controls


B.

A compliance test of program library controls


C.

A compliance test of the program compiler controls


D.

A substantive test of the program compiler controls


Expert Solution
Questions # 59:

When you develop your audit remediation plan what is the MOST important criteria?

Options:

A.

To remediate half of the findings before the next audit.


B.

To remediate all of the findings before the next audit.


C.

To validate that the cost of the remediation is less than the risk of the finding.


D.

To validate the remediation process with the auditor.


Expert Solution
Questions # 60:

Creating a secondary authentication process for network access would be an example of?

Options:

A.

An administrator with too much time on their hands.


B.

Putting undue time commitment on the system administrator.


C.

Supporting the concept of layered security


D.

Network segmentation.


Expert Solution
Viewing page 6 out of 15 pages
Viewing questions 51-60 out of questions