Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 8 out of 13 pages
Viewing questions 106-120 out of questions
Questions # 106:

What is the difference between a quantitative and qualitative risk assessment?

Options:

A.

Qualitative risk assessments use mathematical formulas and precise data


B.

Quantitative risk assessments result in exact numbers


C.

Quantitative risk assessments result in ratings such as high, medium, and low


D.

Quantitative risk assessments never align directly to business objectives


Expert Solution
Questions # 107:

In what phase of an incident management process will malware antivirus signatures be distributed to infrastructure?

Options:

A.

Distribution


B.

Eradication


C.

Containment


D.

Collection


Expert Solution
Questions # 108:

Which of the following is a term related to risk management that represents the estimated frequency at which a threat is expected to transpire?

Options:

A.

Single Loss Expectancy (SLE)


B.

Exposure Factor (EF)


C.

Annualized Rate of Occurrence (ARO)


D.

Temporal Probability (TP)


Expert Solution
Questions # 109:

Which of the following is considered a project versus a managed process?

Options:

A.

monitoring external and internal environment during incident response


B.

ongoing risk assessments of routine operations


C.

continuous vulnerability assessment and vulnerability repair


D.

installation of a new firewall system


Expert Solution
Questions # 110:

Which of the following items is discretionary?

Options:

A.

Procedures


B.

Policies


C.

Guidelines


D.

Standards


Expert Solution
Questions # 111:

Within an organization’s vulnerability management program, who has the responsibility to implement remediation actions?

Options:

A.

Security officer


B.

Data owner


C.

Vulnerability engineer


D.

System administrator


Expert Solution
Questions # 112:

A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?

Options:

A.

tell him to shut down the server


B.

tell him to call the police


C.

tell him to invoke the incident response process


D.

tell him to analyze the problem, preserve the evidence and provide a full analysis and report


Expert Solution
Questions # 113:

What are the common data hiding techniques used by criminals?

Options:

A.

Unallocated space and masking


B.

Website defacement and log manipulation


C.

Disabled Logging and admin elevation


D.

Encryption, Steganography, and Changing Metadata/Timestamps


Expert Solution
Questions # 114:

Security related breaches are assessed and contained through which of the following?

Options:

A.

The IT support team.


B.

A forensic analysis.


C.

Incident response


D.

Physical security team.


Expert Solution
Questions # 115:

A cloud computing environment that is bound together by technology that allows data and applications to be shared between public and private clouds is BEST referred to as a?

Options:

A.

Public cloud


B.

Private cloud


C.

Community cloud


D.

Hybrid cloud


Expert Solution
Questions # 116:

Who is responsible for verifying that audit directives are implemented?

Options:

A.

IT Management


B.

Internal Audit


C.

IT Security


D.

BOD Audit Committee


Expert Solution
Questions # 117:

Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?

Options:

A.

Risk Assessment


B.

Incident Response


C.

Risk Management


D.

Network Security administration


Expert Solution
Questions # 118:

Creating good security metrics is essential for a CISO. What would be the BEST sources for creating security metrics for baseline defenses coverage?

Options:

A.

Servers, routers, switches, modem


B.

Firewall, exchange, web server, intrusion detection system (IDS)


C.

Firewall, anti-virus console, IDS, syslog


D.

IDS, syslog, router, switches


Expert Solution
Questions # 119:

Which of the following is considered the MOST effective tool against social engineering?

Options:

A.

Anti-phishing tools


B.

Anti-malware tools


C.

Effective Security Vulnerability Management Program


D.

Effective Security awareness program


Expert Solution
Questions # 120:

In which of the following cases would an organization be more prone to risk acceptance vs. risk mitigation?

Options:

A.

The organization's risk tolerance is high


B.

The organization uses exclusively a qualitative process to measure risk


C.

The organization uses exclusively a quantitative process to measure risk


D.

The organization's risk tolerance is low


Expert Solution
Viewing page 8 out of 13 pages
Viewing questions 106-120 out of questions