Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 7 out of 13 pages
Viewing questions 91-105 out of questions
Questions # 91:

When briefing senior management on the creation of a governance process, the MOST important aspect should be:

Options:

A.

information security metrics.


B.

knowledge required to analyze each issue.


C.

baseline against which metrics are evaluated.


D.

linkage to business area objectives.


Expert Solution
Questions # 92:

What is the last step in the system authorization process?

Options:

A.

Connecting the systems to an Internet Service Provider (ISP) for verification


B.

Getting authority to operate the system from executive management


C.

Changing the default passwords within all affected systems


D.

Conducting a final scan of the production system and mitigating all high-level vulnerabilities


Expert Solution
Questions # 93:

Which of the following provides the BEST approach to achieving positive outcomes while preserving savings?

Options:

A.

Business Impact Analysis


B.

Cost-benefit analysis


C.

Economic impact analysis


D.

Return on Investment


Expert Solution
Questions # 94:

When performing a forensic investigation, what are the two MOST common sources for obtaining computer evidence?

Options:

A.

Configurations and software patch level


B.

Unallocated system storage and removable drives


C.

Persistent and volatile data


D.

Screen captures and keystroke logs


Expert Solution
Questions # 95:

Which of the following is a PRIMARY purpose of a Security Operations Center (SOC)?

Options:

A.

Supporting the help desk


B.

Providing risk assessments


C.

Monitoring infrastructure


D.

Providing automatic security alerts


Expert Solution
Questions # 96:

Which of the following is a symmetric encryption algorithm?

Options:

A.

3DES


B.

MD5


C.

ECC


D.

RSA


Expert Solution
Questions # 97:

The company decides to release the application without remediating the high-risk vulnerabilities. Which of the following is the MOST likely reason for the company to release the application?

Options:

A.

The company lacks a risk management process


B.

The company does not believe the security vulnerabilities to be real


C.

The company has a high risk tolerance


D.

The company lacks the tools to perform a vulnerability assessment


Expert Solution
Questions # 98:

What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?

Options:

A.

Determine appetite


B.

Evaluate risk avoidance criteria


C.

Perform a risk assessment


D.

Mitigate risk


Expert Solution
Questions # 99:

The framework that helps to define a minimum standard of protection that business stakeholders must attempt to achieve is referred to as a standard of:

Options:

A.

Due Protection


B.

Due Care


C.

Due Compromise


D.

Due process


Expert Solution
Questions # 100:

XYZ is a publicly-traded software development company.

Who is ultimately accountable to the shareholders in the event of a cybersecurity breach?

Options:

A.

Chief Financial Officer (CFO)


B.

Chief Software Architect (CIO)


C.

CISO


D.

Chief Executive Officer (CEO)


Expert Solution
Questions # 101:

You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?

Options:

A.

Chief Information Security Officer


B.

Chief Executive Officer


C.

Chief Information Officer


D.

Chief Legal Counsel


Expert Solution
Questions # 102:

What is the PRIMARY guideline when analyzing the cost of a security control versus the cost of the asset?

Options:

A.

The control cost should be equal to the value of the asset being protected


B.

The control cost should be greater than the value of the asset being protected


C.

The control cost should be less than the value of the asset being protected


D.

The control cost should always depend on the value of the mitigation


Expert Solution
Questions # 103:

A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?

Options:

A.

Internal audit


B.

The data owner


C.

All executive staff


D.

Government regulators


Expert Solution
Questions # 104:

A Security Operations (SecOps) Manager is considering implementing threat hunting to be able to make better decisions on protecting information and assets.

What is the MAIN goal of threat hunting to the SecOps Manager?

Options:

A.

Improve discovery of valid detected events


B.

Enhance tuning of automated tools to detect and prevent attacks


C.

Replace existing threat detection strategies


D.

Validate patterns of behavior related to an attack


Expert Solution
Questions # 105:

Which of the following is critical for a successful risk management program?

Options:

A.

Accepting risk for regulatory compliance requirements


B.

Ensure developers include risk control comments in code


C.

Create risk assessment templates for every threat


D.

Provide risk visibility within the organization


Expert Solution
Viewing page 7 out of 13 pages
Viewing questions 91-105 out of questions