Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 9 out of 13 pages
Viewing questions 121-135 out of questions
Questions # 121:

Which organizational structure blends elements of functional and project organizational models to create a hybrid reporting structure?

Options:

A.

Distributed


B.

Sole owner


C.

Limited liability


D.

Matrix


Expert Solution
Questions # 122:

Effective information security management programs require the active involvement of_________

Options:

A.

ClOS


B.

All employees


C.

Security Managers


D.

Executives


Expert Solution
Questions # 123:

Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?

Options:

A.

Plan-Check-Do-Act


B.

Plan-Do-Check-Act


C.

Plan-Select-Implement-Evaluate


D.

SCORE (Security Consensus Operational Readiness Evaluation)


Expert Solution
Questions # 124:

Risk appetite is typically determined by which of the following organizational functions?

Options:

A.

Security


B.

Business units


C.

Board of Directors


D.

Audit and compliance


Expert Solution
Questions # 125:

Enforcing the implementation and management of security controls within services or products offered by third-party providers is a vital component of which security program service to the business?

Options:

A.

Vulnerability management


B.

Metrics and results enforcement


C.

Vendor management


D.

Security program governance


Expert Solution
Questions # 126:

During an initial investigation, the Incident Response Team suspects criminal activity but cannot initially prove or disprove illegal actions. What is the MOST critical action they should take?

Options:

A.

Preservation of evidence


B.

Constant communication of status to executives


C.

Eradication of malware and system restoration


D.

Determination of the attack source


Expert Solution
Questions # 127:

Risk appetite directly affects what part of a vulnerability management program?

Options:

A.

Staff


B.

Scope


C.

Schedule


D.

Scan tools


Expert Solution
Questions # 128:

A newly-hired CISO needs to understand the organization’s financial management standards for business units

and operations. Which of the following would be the best source of this information?

Options:

A.

The internal accounting department


B.

The Chief Financial Officer (CFO)


C.

The external financial audit service


D.

The managers of the accounts payables and accounts receivables teams


Expert Solution
Questions # 129:

A university recently hired a CISO. One of the first tasks is to develop a continuity of operations plan (COOP).

In developing the business impact assessment (BIA), which of the following MOST closely relate to the data backup and restoral?

Options:

A.

Recovery Point Objective (RPO)


B.

Mean Time to Delivery (MTD)


C.

Recovery Time Objective (RTO)


D.

Maximum Tolerable Downtime (MTD)


Expert Solution
Questions # 130:

Which is the single MOST important factor for introducing digital evidence into a court of law?

Options:

A.

Uninterrupted chain of custody


B.

Comprehensive logs from all servers and network devices


C.

Fully trained network experts to analyze systems


D.

Expert security operations witnesses


Expert Solution
Questions # 131:

Which of the following tests is an IS auditor performing when a sample of programs is selected to determine if the source and object versions are the same?

Options:

A.

A substantive test of program library controls


B.

A compliance test of program library controls


C.

A compliance test of the program compiler controls


D.

A substantive test of the program compiler controls


Expert Solution
Questions # 132:

Which of the following is the MOST critical step when establishing a security governance program?

Options:

A.

Prepare a security budget


B.

Conduct a workshop for all end users


C.

Obtain senior-level sponsorship


D.

Create a risk management program


Expert Solution
Questions # 133:

Which of the following is a benefit of a risk-based approach to audit planning?

Options:

A.

Resources are allocated to the areas of the highest concern


B.

Scheduling may be performed months in advance


C.

Budgets are more likely to be met by the IT audit staff


D.

Staff will be exposed to a variety of technologies


Expert Solution
Questions # 134:

Which of the following functions evaluates patches used to close software vulnerabilities of new systems to assure compliance with policy when implementing an information security program?

Options:

A.

System testing


B.

Risk assessment


C.

Incident response


D.

Planning


Expert Solution
Questions # 135:

As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.

1.Covering tracks

2.Scanning and enumeration

3.Maintaining Access

4.Reconnaissance

5.Gaining Access

Options:

A.

4, 2, 5, 3, 1


B.

2, 5, 3, 1, 4


C.

4, 5, 2, 3, 1


D.

4, 3, 5, 2, 1


Expert Solution
Viewing page 9 out of 13 pages
Viewing questions 121-135 out of questions