Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 6 out of 14 pages
Viewing questions 51-60 out of questions
Questions # 51:

What key technology can mitigate ransomware threats?

Options:

A.

Use immutable data storage


B.

Phishing exercises


C.

Application of multiple end point anti-malware solutions


D.

Blocking use of wireless networks


Expert Solution
Questions # 52:

What are the common data hiding techniques used by criminals?

Options:

A.

Unallocated space and masking


B.

Website defacement and log manipulation


C.

Disabled Logging and admin elevation


D.

Encryption, Steganography, and Changing Metadata/Timestamps


Expert Solution
Questions # 53:

A university recently hired a CISO. One of the first tasks is to develop a continuity of operations plan (COOP).

In developing the business impact assessment (BIA), which of the following MOST closely relate to the data backup and restoral?

Options:

A.

Recovery Point Objective (RPO)


B.

Mean Time to Delivery (MTD)


C.

Recovery Time Objective (RTO)


D.

Maximum Tolerable Downtime (MTD)


Expert Solution
Questions # 54:

Who is responsible for verifying that audit directives are implemented?

Options:

A.

IT Management


B.

Internal Audit


C.

IT Security


D.

BOD Audit Committee


Expert Solution
Questions # 55:

You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.

Which control is MOST important to protect AI products?

Options:

A.

Hash datasets


B.

Sanitize datasets


C.

Delete datasets


D.

Encrypt datasets


Expert Solution
Questions # 56:

Many successful cyber-attacks currently include:

Options:

A.

Phishing Attacks


B.

Misconfigurations


C.

All of these


D.

Social engineering


Expert Solution
Questions # 57:

The process of identifying and classifying assets is typically included in the

Options:

A.

Threat analysis process


B.

Asset configuration management process


C.

Business Impact Analysis


D.

Disaster Recovery plan


Expert Solution
Questions # 58:

A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?

Options:

A.

non-repudiation


B.

conflict resolution


C.

strong authentication


D.

digital rights management


Expert Solution
Questions # 59:

Which of the following is a countermeasure to prevent unauthorized database access from web applications?

Options:

A.

Session encryption


B.

Removing all stored procedures


C.

Input sanitization


D.

Library control


Expert Solution
Questions # 60:

In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:

Options:

A.

Secure the area and shut-down the computer until investigators arrive


B.

Secure the area and attempt to maintain power until investigators arrive


C.

Immediately place hard drive and other components in an anti-static bag


D.

Secure the area.


Expert Solution
Viewing page 6 out of 14 pages
Viewing questions 51-60 out of questions