Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 8 out of 15 pages
Viewing questions 71-80 out of questions
Questions # 71:

Of the following types of SOCs (Security Operations Centers), which one would be MOST likely used if the CISO has decided to outsource the infrastructure and administration of it?

Options:

A.

Virtual


B.

Dedicated


C.

Fusion


D.

Command


Expert Solution
Questions # 72:

While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?

Options:

A.

Enterprise Risk Assessment


B.

Disaster recovery strategic plan


C.

Business continuity plan


D.

Application mapping document


Expert Solution
Questions # 73:

Which of the following is a common technology for visual monitoring?

Options:

A.

Closed circuit television


B.

Open circuit television


C.

Blocked video


D.

Local video


Expert Solution
Questions # 74:

Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?

Options:

A.

Upper management support


B.

More frequent project milestone meetings


C.

More training of staff members


D.

Involve internal audit


Expert Solution
Questions # 75:

Ensuring that the actions of a set of people, applications and systems follow the organization’s rules is BEST described as:

Options:

A.

Risk management


B.

Security management


C.

Mitigation management


D.

Compliance management


Expert Solution
Questions # 76:

What does RACI stand for?

Options:

A.

Reasonable, Actionable, Controlled, and Implemented


B.

Responsible, Actors, Consult, and Instigate


C.

Responsible, Accountable, Consulted, and Informed


D.

Review, Act, Communicate, and Inform


Expert Solution
Questions # 77:

An organization has defined a set of standard security controls. This organization has also defined the circumstances and conditions in which they must be applied. What is the NEXT logical step in applying the controls in the organization?

Options:

A.

Determine the risk tolerance


B.

Perform an asset classification


C.

Create an architecture gap analysis


D.

Analyze existing controls on systems


Expert Solution
Questions # 78:

Which control is used to discourage the exploitation of a vulnerability or system?

Options:

A.

Preventive


B.

Corrective


C.

Detective


D.

Deterrent


Expert Solution
Questions # 79:

Which of the following is considered one of the most frequent failures in project management?

Options:

A.

Overly restrictive management


B.

Excessive personnel on project


C.

Failure to meet project deadlines


D.

Insufficient resources


Expert Solution
Questions # 80:

What is the PRIMARY weakness of a Cost Benefit Analysis (CBA)?

Options:

A.

It is not used very often


B.

It is not always precise


C.

It is not effective for mid-sized investments


D.

A positive result is an indication that the effort should be pursued


Expert Solution
Viewing page 8 out of 15 pages
Viewing questions 71-80 out of questions