Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 7 out of 15 pages
Viewing questions 61-70 out of questions
Questions # 61:

IT control objectives are useful to IT auditors as they provide the basis for understanding the:

Options:

A.

Desired results or purpose of implementing specific control procedures.


B.

The audit control checklist.


C.

Techniques for securing information.


D.

Security policy


Expert Solution
Questions # 62:

When measuring the effectiveness of an Information Security Management System which one of the following would be MOST LIKELY used as a metric framework?

Options:

A.

ISO 27001


B.

PRINCE2


C.

ISO 27004


D.

ITILv3


Expert Solution
Questions # 63:

Who in the organization determines access to information?

Options:

A.

Legal department


B.

Compliance officer


C.

Data Owner


D.

Information security officer


Expert Solution
Questions # 64:

Risk that remains after risk mitigation is known as

Options:

A.

Persistent risk


B.

Residual risk


C.

Accepted risk


D.

Non-tolerated risk


Expert Solution
Questions # 65:

Which of the following is the MOST important goal of risk management?

Options:

A.

Identifying the risk


B.

Finding economic balance between the impact of the risk and the cost of the control


C.

Identifying the victim of any potential exploits.


D.

Assessing the impact of potential threats


Expert Solution
Questions # 66:

Assigning the role and responsibility of Information Assurance to a dedicated and independent security group is an example of:

Options:

A.

Detective Controls


B.

Proactive Controls


C.

Preemptive Controls


D.

Organizational Controls


Expert Solution
Questions # 67:

Which of the following most commonly falls within the scope of an information security governance steering committee?

Options:

A.

Approving access to critical financial systems


B.

Developing content for security awareness programs


C.

Interviewing candidates for information security specialist positions


D.

Vetting information security policies


Expert Solution
Questions # 68:

You work as a project manager for TYU project. You are planning for risk mitigation. You need to quickly identify high-level risks that will need a more in-depth analysis. Which of the following activities will help you in this?

Options:

A.

Qualitative analysis


B.

Quantitative analysis


C.

Risk mitigation


D.

Estimate activity duration


Expert Solution
Questions # 69:

Creating good security metrics is essential for a CISO. What would be the BEST sources for creating security metrics for baseline defenses coverage?

Options:

A.

Servers, routers, switches, modem


B.

Firewall, exchange, web server, intrusion detection system (IDS)


C.

Firewall, anti-virus console, IDS, syslog


D.

IDS, syslog, router, switches


Expert Solution
Questions # 70:

Which is the BEST solution to monitor, measure, and report changes to critical data in a system?

Options:

A.

Application logs


B.

File integrity monitoring


C.

SNMP traps


D.

Syslog


Expert Solution
Viewing page 7 out of 15 pages
Viewing questions 61-70 out of questions