Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 7 out of 15 pages
Viewing questions 61-70 out of questions
Questions # 61:

How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/International Standard on Assurance Engagements 3402 (ISAE3402) report of your vendors be reviewed?

Options:

A.

Quarterly


B.

Semi-annually


C.

Bi-annually


D.

Annually


Expert Solution
Questions # 62:

When entering into a third party vendor agreement for security services, at what point in the process is it BEST to understand and validate the security posture and compliance level of the vendor?

Options:

A.

At the time the security services are being performed and the vendor needs access to the network


B.

Once the agreement has been signed and the security vendor states that they will need access to the network


C.

Once the vendor is on premise and before they perform security services


D.

Prior to signing the agreement and before any security services are being performed


Expert Solution
Questions # 63:

Many times a CISO may have to speak to the Board of Directors (BOD) about their cyber security posture. What would be the BEST choice of security metrics to present to the BOD?

Options:

A.

All vulnerabilities found on servers and desktops


B.

Only critical and high vulnerabilities on servers and desktops


C.

Only critical and high vulnerabilities that impact important production servers


D.

All vulnerabilities that impact important production servers


Expert Solution
Questions # 64:

Which regulation or policy governs protection of personally identifiable user data gathered during a cyber investigation?

Options:

A.

ITIL


B.

Privacy Act


C.

Sarbanes Oxley


D.

PCI-DSS


Expert Solution
Questions # 65:

What enterprise architecture framework is business-centric and composed of eight phases?

Options:

A.

Global Regulations Security Architecture


B.

The Open Group Architecture Framework (TOGAF)


C.

Federated Enterprise Architecture


D.

Control Objectives for Information Technology (COBIT)


Expert Solution
Questions # 66:

What is the name of a formal statement that defines the strategy, approach, or expectations related to specific concerns within an organization:

Options:

A.

Policy


B.

standard


C.

Procedure


D.

Guideline


Expert Solution
Questions # 67:

As the Business Continuity Coordinator of a financial services organization, you are responsible for ensuring assets are recovered timely in the event of a disaster. Which is the BEST Disaster Recovery performance indicator to validate that you are prepared for a disaster?

Options:

A.

Recovery Point Objective (RPO)


B.

Disaster Recovery Plan


C.

Recovery Time Objective (RTO)


D.

Business Continuity Plan


Expert Solution
Questions # 68:

You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):

Options:

A.

Deploy a SEIM solution and have current staff review incidents first thing in the morning


B.

Contract with a managed security provider and have current staff on recall for incident response


C.

Configure your syslog to send SMS messages to current staff when target events are triggered


D.

Employ an assumption of breach protocol and defend only essential information resources


Expert Solution
Questions # 69:

A global retail organization is looking to implement a consistent Disaster Recovery and Business Continuity Process across all of its business units. Which of the following standards and guidelines can BEST address this organization’s need?

Options:

A.

International Organization for Standardizations – 22301 (ISO-22301)


B.

Information Technology Infrastructure Library (ITIL)


C.

Payment Card Industry Data Security Standards (PCI-DSS)


D.

International Organization for Standardizations – 27005 (ISO-27005)


Expert Solution
Questions # 70:

An IT auditor has recently discovered that because of a shortage of skilled operations personnel, the security administrator has agreed to work one late night shift a week as the senior computer operator. The most appropriate course of action for the IT auditor is to:

Options:

A.

Inform senior management of the risk involved.


B.

Agree to work with the security officer on these shifts as a form of preventative control.


C.

Develop a computer assisted audit technique to detect instances of abuses of the arrangement.


D.

Review the system log for each of the late night shifts to determine whether any irregular actions occurred.


Expert Solution
Viewing page 7 out of 15 pages
Viewing questions 61-70 out of questions