Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 9 out of 15 pages
Viewing questions 81-90 out of questions
Questions # 81:

Creating a secondary authentication process for network access would be an example of?

Options:

A.

An administrator with too much time on their hands.


B.

Putting undue time commitment on the system administrator.


C.

Supporting the concept of layered security


D.

Network segmentation.


Expert Solution
Questions # 82:

SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.

In what phase of the response will the team extract information from the affected systems without altering original data?

Options:

A.

Response


B.

Investigation


C.

Recovery


D.

Follow-up


Expert Solution
Questions # 83:

Which of the following activities results in change requests?

Options:

A.

Preventive actions


B.

Inspection


C.

Defect repair


D.

Corrective actions


Expert Solution
Questions # 84:

An international organization is planning a project to implement encryption technologies to protect company confidential information. This organization has data centers on three continents. Which of the following would be considered a MAJOR constraint for the project?

Options:

A.

Time zone differences


B.

Compliance to local hiring laws


C.

Encryption import/export regulations


D.

Local customer privacy laws


Expert Solution
Questions # 85:

How often should the SSAE16 report of your vendors be reviewed?

Options:

A.

Quarterly


B.

Semi-annually


C.

Annually


D.

Bi-annually


Expert Solution
Questions # 86:

SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.

What is the MOST logical course of action the CISO should take?

Options:

A.

Review the original solution set to determine if another system would fit the organization’s risk appetite and budgetregulatory compliance requirements


B.

Continue with the implementation and submit change requests to the vendor in order to ensure required functionality will be provided when needed


C.

Continue with the project until the scalability issue is validated by others, such as an auditor or third party assessor


D.

Cancel the project if the business need was based on internal requirements versus regulatory compliance requirements


Expert Solution
Questions # 87:

When performing a forensic investigation, what are the two MOST common data sources for obtaining evidence from a computer and mobile devices?

Options:

A.

RAM and unallocated space


B.

Unallocated space and RAM


C.

Slack space and browser cache


D.

Persistent and volatile data


Expert Solution
Questions # 88:

Which of the following information may be found in table top exercises for incident response?

Options:

A.

Security budget augmentation


B.

Process improvements


C.

Real-time to remediate


D.

Security control selection


Expert Solution
Questions # 89:

An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the NEXT step?

Options:

A.

Determine the annual loss expectancy (ALE)


B.

Create a crisis management plan


C.

Create technology recovery plans


D.

Build a secondary hot site


Expert Solution
Questions # 90:

The process to evaluate the technical and non-technical security controls of an IT system to validate that a given design and implementation meet a specific set of security requirements is called

Options:

A.

Security certification


B.

Security system analysis


C.

Security accreditation


D.

Alignment with business practices and goals.


Expert Solution
Viewing page 9 out of 15 pages
Viewing questions 81-90 out of questions